1. (TCO 5) What is a weakness of symmetric encryption? (Points : 5) Modern math processors can break it quickly.
It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
Since the key must be transmitted, the scheme is only as secure as your transport method.
Throughput is minimal, making it a poor choice for large files.
Symmetric key encryption has no weaknesses.
Question 2. 2. (TCO 5) Which is an asymmetric key encryption system? (Points : 5) |
SSL
DES
PGP |
Question 3. 3. (TCO 6) A good definition of VPNs is they are a combination of authentication, access control, _____ (Points : 5) |
tunneling, and dial up
tunneling, and encryption
leased lines, ISP, and piggy backing
Internet direct access, and dial up |
Question 4. 4. (TCO 6) IPSEC supports which two types of modes? Tunnel and: (Points : 5) |
Transport
Bridge
Insecure
non IP |
Question 5. 5. (TCO 4) What profiling types are used in anomaly detection? (Points : 5) |
Deflection and deterrence
Resource and user/group work
Infiltration and preemptive blocking
Snort and Cisco intrusion detection |
Question 6. 6. (TCO 8) What Windows account types are most attractive to attackers?(Points : 5) |
Administrators, IUSR_Machine name
Guests, backdoors
Apache, sysadam
DC security, HIsecdc |
Question 7. 7. (TCO 8) The most powerful account to have in a Linux system is: (Points : 5) |
Admin
Null
Root
Apache
No comments:
Post a Comment