Filters
Question type

Study Flashcards

Which of the following biometric authentication systems is considered to be the most secure?


A) Fingerprint recognition
B) Signature recognition
C) Keystroke pattern recognition
D) Retina pattern recognition

Correct Answer

verifed

verified

The third generation of firewalls,____ keeps track of each network connection established between internal and external systems using a specialized table.


A) stateful inspection firewall
B) application-level firewall
C) dynamic packet filtering firewall
D) packet filtering firewalls

Correct Answer

verifed

verified

Briefly describe how biometric technologies are generally evaluated.

Correct Answer

verifed

verified

Biometric technologies are generally eva...

View Answer

A(n)____________________ token uses a challenge-response system in which the server challenges the user with a number,that when entered into the token provides a response that provides access.

Correct Answer

verifed

verified

A ____ is an example of the "something you produce" authentication mechanism.


A) password
B) dumb card
C) voice recognition
D) retina and iris scan

Correct Answer

verifed

verified

Network-address translation (NAT)is often implemented with the screened-host firewalls architecture.

Correct Answer

verifed

verified

The Data Encryption Standard (DES)is a popular symmetric encryption system and uses a 64-bit block size and a(n)64-bit key._________________________

Correct Answer

verifed

verified

A best practice in the configuration of a firewall is all traffic from the trusted network is ____________________.

Correct Answer

verifed

verified

allowed
a...

View Answer

The private key encryption is also referred to as ____________________ encryption.

Correct Answer

verifed

verified

The ability to restrict specific services is a common practice in most modern routers,and is invisible to the user.

Correct Answer

verifed

verified

Cryptology is the process of deciphering the original message also known as plaintext from an encrypted message._________________________

Correct Answer

verifed

verified

A ____ intrusion detection and prevention system is also known as a behavior-based intrusion detection system.


A) network-based
B) statistical anomaly-based
C) host-based
D) signature-based

Correct Answer

verifed

verified

A ____ is an example of the "something you know" authentication mechanism.


A) signature pattern recognition
B) password
C) fingerprint
D) smart card

Correct Answer

verifed

verified

Values are rearranged within a block to create the ciphertext in the ____ cipher method.


A) permutation
B) Vernam
C) substitution
D) monoalphabetic

Correct Answer

verifed

verified

Bastion host is also referred to as a(n)____________________ host.

Correct Answer

verifed

verified

A(n)____________________ key is a symmetric key for temporary communications.

Correct Answer

verifed

verified

Automated control systems for the most part can learn from mistakes,and they can adapt to changing situations.

Correct Answer

verifed

verified

An organization's Web page can provide information that can be used in social engineering attacks.

Correct Answer

verifed

verified

____ are capable of identifying active computers on a network.


A) Agents
B) Port scanners
C) Consolidated enterprise managers
D) Intrusion detection and prevention systems

Correct Answer

verifed

verified

Kerberos' ____ is an interacting application that validates clients and servers.


A) Ticket Granting Service
B) Authentication Server
C) Authentication Client
D) Key Distribution Center

Correct Answer

verifed

verified

Showing 101 - 120 of 133

Related Exams

Show Answer