general business data bank

Question # 00003393 Posted By: spqr Updated on: 11/11/2013 12:27 AM Due on: 11/29/2013
Subject Business Topic General Business Tutorials:
Question
Dot Image

1.

_______________ is a modulation type that spreads the traffic sent over the entire

bandwidth.

2.

_______________ is the granting of specific permissions based on the privileges held by

the account.

3.

A door that requires a thumbprint, key card, and password is an example of

A) Mutual authentication

B) Multifactor authentication

C) Single sign-on

D) Dual access control

4.

One of the fundamental design aspects of TACACS+ is the separation of authentication,

authorization, and accounting.

A) True

B) False

5.

Because the security of wireless LANs is ineffective, many users have switched to a

layered security approach.

A) True

B) False

6.

Which of the following protocols involves a three-way handshake and uses a shared

secret key for communication?

A) S/Telnet

B) PAP

C) TCP

D) CHAP

7.

_______________ authentication is a term that describes the use of more than one

authentication mechanism at the same time.

8.

The three major components of the SSH protocol are the

A) User Datagram Protocol, User Encryption Protocol, and Connection Protocol

B) Transport Layer Protocol, User Authentication Protocol, and Connection

Protocol

C) User Datagram Protocol, User Authentication Protocol, and Connection

Protocol

D) Transport Layer Protocol, User Encryption Protocol, and Connection Protocol

9.

The security concern over the so-called WAP gap is when

A) WAP protocol is susceptible to Gateway Acquisition Pilfering (gap).

B) WAP gateways have a significant lag and hold the messages long enough for

them to be decrypted by attackers.

C) The encryption fails to translate from one encryption scheme to another.

D) WAP gateways perform translation from one encryption standard to another all

messages are seen in plaintext by the WAP gateway.

10.

Physical access to a machine will enable an attacker to bypass any security measure that

has been placed on that machine.

A) True

B) False

11.

_______________ multiplexes or separates the data to be transmitted into smaller chunks

and then transmits the chunks on several sub channels.

)

12.

_______________ describes a process in which each side of an electronic

communication verifies the authenticity of the other.

13.

Which type of access control would allow the company to restrict employee access to the

payroll file after hours or on weekends?

A) Discretionary access control

B) Rule-based access control

C) Role-based access control

D) Mandatory access control

14.

Security issues associated with WTLS include which of the following?

A) The specifications do not allow connections without high security.

B) Clients with low memory or CPU capabilities cannot support encryption.

C) WTLS cannot cope with limited processor capacity.

D) WTLS cannot cope with small amounts of memory.

15.

Dot Image
Tutorials for this Question
  1. Tutorial # 00003205 Posted By: spqr Posted on: 11/11/2013 12:45 AM
    Puchased By: 2
    Tutorial Preview
    The solution of general business data bank...
    Attachments
    257.docx (12.83 KB)

Great! We have found the solution of this question!

Whatsapp Lisa