AHS 131 HIT CH. 7 & 8
Class C, electrical
An electrical fire like that which would be found in a computer data closet is known as what type of fire?
Copies all files changed since the last full or incremental backup
An incremental backup
Rogue access point
An unauthorized AP is called
1
Anytime the contents of that file or changed, the archive bit exchange to blank meaning that this modified file now needs to be backed up
Alice's public key
If Bob wants to send a secure message to Alice using an asymmetric cryptography algorithm, the key he uses to encrypt the message is
Wi-Fi protected access to, WPA2
The two models for personal wireless security developed by the Wi-Fi Alliance or Wi-Fi protected access, WPA and
Closed-circuit television. CCTV
Using video cameras to transmit a signal to a specific and limited set of receivers is called blank
Temporal Integrity protocol, tkip
WPA replaces WEP with
Plain text
What is data called that is to be encrypted by inputting into an encryption algorithm
Electricity
Which of the following can be used to power a backup generator except
Weight
Which of the following human characteristics cannot be used by biometric identification?
How long will it take to finish the backup
Which of the following is a basic question to be asked regarding creating a data backup except
Use a short password so the computer can process it more quickly
Which of the following is a step in creating a strong password except
Mac addresses are in initially exchange between wireless devices in the AP in an unencrypted format
Which of the following is a vulnerability of MAC address filtering
Stop loss
Which of the following is not a basic security protection over information that cryptography can provide?
Most sites force users to create weak passwords, although they do not want to
Which of the following is not a reason users create weak passwords?
A spark to start the process
Which of the following is required for a fire to occur except blank
Advanced encryption standard
Which of the following is the strongest symmetric cryptographic algorithm
It is always running off its battery
Which of the following is true regarding and offline UPS except
WPA2
Which of the following provides the strongest security for a wireless network
Netgear
Which of the following would be a secure SSID
Hard based VPN s
Which of these types of VPNs have the best security
Prevent certain applications from launching that will consume too much power
A UPS can perform each of the following except blank
Main distribution frame, MDF
A blank is a wiring rat that is used to connect external network connections
Online UPS
A blank is always running off its battery while the main power runs the battery charger
Worm
A blank requires a user to transport it from one computer to another
Cost
A disadvantage of biometric readers is
Unsecured public network
A virtual private Network uses a blank for transmissions
Secure shell, SSH
Blank is an encrypted alternative to telnet
Point-to-point tunneling protocol, pptp
Blank is used as a VPN tunneling protocol
Deadbolt
Blank locks are found in commercial buildings and are different from residential door locks
Processes
Each of the following are used to protect information, Hardware, software, and Communications except blank
Local probe
Each of the following is a type of Wireless probe except
It requires a laptop computer to implement
Each of the following is true about a RADIUS client except
Confidentiality
Ensures that only authorized parties can view the information
Nonrepudiation
Proving that a user sent an email message is known as
Mobile devices
Security lighting can be installed on each of the following areas except blank
Private key cryptography
Symmetric cryptography algorithms are also called
Provides cryptographic services in Hardware instead of software
The Trusted platform module, TPM
It's usage creates a detectable pattern
The primary weakness of wired equivalent privacy WEP is