general business data bank
1.
_______________ is a modulation type that spreads the traffic sent over the entire
bandwidth.
2.
_______________ is the granting of specific permissions based on the privileges held by
the account.
3.
A door that requires a thumbprint, key card, and password is an example of
A) Mutual authentication
B) Multifactor authentication
C) Single sign-on
D) Dual access control
4.
One of the fundamental design aspects of TACACS+ is the separation of authentication,
authorization, and accounting.
A) True
B) False
5.
Because the security of wireless LANs is ineffective, many users have switched to a
layered security approach.
A) True
B) False
6.
Which of the following protocols involves a three-way handshake and uses a shared
secret key for communication?
A) S/Telnet
B) PAP
C) TCP
D) CHAP
7.
_______________ authentication is a term that describes the use of more than one
authentication mechanism at the same time.
8.
The three major components of the SSH protocol are the
A) User Datagram Protocol, User Encryption Protocol, and Connection Protocol
B) Transport Layer Protocol, User Authentication Protocol, and Connection
Protocol
C) User Datagram Protocol, User Authentication Protocol, and Connection
Protocol
D) Transport Layer Protocol, User Encryption Protocol, and Connection Protocol
9.
The security concern over the so-called WAP gap is when
A) WAP protocol is susceptible to Gateway Acquisition Pilfering (gap).
B) WAP gateways have a significant lag and hold the messages long enough for
them to be decrypted by attackers.
C) The encryption fails to translate from one encryption scheme to another.
D) WAP gateways perform translation from one encryption standard to another all
messages are seen in plaintext by the WAP gateway.
10.
Physical access to a machine will enable an attacker to bypass any security measure that
has been placed on that machine.
A) True
B) False
11.
_______________ multiplexes or separates the data to be transmitted into smaller chunks
and then transmits the chunks on several sub channels.
)
12.
_______________ describes a process in which each side of an electronic
communication verifies the authenticity of the other.
13.
Which type of access control would allow the company to restrict employee access to the
payroll file after hours or on weekends?
A) Discretionary access control
B) Rule-based access control
C) Role-based access control
D) Mandatory access control
14.
Security issues associated with WTLS include which of the following?
A) The specifications do not allow connections without high security.
B) Clients with low memory or CPU capabilities cannot support encryption.
C) WTLS cannot cope with limited processor capacity.
D) WTLS cannot cope with small amounts of memory.
15.
-
Rating:
5/
Solution: general business data bank