CIW Lesson 6 B

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which choice correctly describes symmetric-key encryption?

It is very fast, and all recipients and viewers must have the same key.

Which choice correctly describes asymmetric-key encryption?

It is very slow, and the public key is distributed because the private key stays secure with the user.

The Advanced Encryption Standard (AES) Rijndael algorithm is a block cipher that allows for the creation of:

256-bit keys.

Which choice correctly describes an intranet?

A private network to which only company employees have access

What is a firewall?

A secure computer system placed between a secured network and an open, unsecured network

What is a proxy server?

A server that mediates traffic between a protected network and the Internet, and replaces the network IP address with a single IP address

Which of the following should you implement in order to isolate a group of computers to which access to certain protocols is prohibited, and to help reduce network traffic by balancing the load between network segments?

A virtual LAN (VLAN)

In which of the following is a mathematically matched key pair needed to encrypt and decrypt messages?

Asymmetric-key encryption

What is the term for a mini-network that resides between a company's internal network and the Internet, and is separate from both?

Demilitarized zone (DMZ)

What is the term for a private network that allows selected access to outsiders only after they provide authentication information?

Extranet

Which of the following activities can be performed by a router and is a good first line of defense against unwanted intrusions?

Filtering packets

Which encryption method should you use for information that will not be decrypted or read?

Hash encryption

Which of the following is a VPN authentication and encryption standard that provides security over the Internet?

IP Security (IPsec)

What is the term for a proprietary key-management scheme that uses symmetric algorithms and acts as a trusted third party that knows the identities of the organizations asking to communicate, but does not reveal them?

Kerberos

If Internet access is required and a network is located behind a proxy server, how can you ensure that users have access to Internet services that use less-common ports?

Make sure the network has access to all Internet-related protocols used by the company by opening their associated ports at the proxy server.

Which of the following terms is associated with the practice of hiding internal IP addresses from the external network?

Network Address Translation (NAT)

Which of the following combines encryption methods to facilitate secure communications over long distances by employing the strengths of each method?

Pretty Good Privacy (PGP)

In which of the following is one key used to encrypt and decrypt messages?

Symmetric-key encryption

Which of the following generally comprises the corporate network backbone in a Virtual Private Network (VPN)?

The Internet

A network security audit should be conducted by:

a party that is not responsible for maintaining the network on a daily basis.

A firewall that is used to protect an individual system is known as:

a personal firewall.

A standard firewall that resides inside your company's internal network is known as:

an internal firewall.

Rivest, Shamir, Adleman (RSA) and Digital Signature Algorithm (DSA) are examples of:

asymmetric-key algorithms.

A firewall:

includes functionality to filter packets, detect intrusions and provide enhanced password authentication.

An application-level gateway is an example of a:

proxy server.

Data Encryption Standard (DES), Triple DES and Advanced Encryption Standard (AES) are examples of:

symmetric-key algorithms.

A protocol that encapsulates data packets into another packet is known as a:

tunneling protocol.


Ensembles d'études connexes

Wordly Wise Lesson 4 accurate--deteriorate

View Set

Module 1 - 68 Concepts - Mostly chapter 1

View Set

Chapter 5: Growth & Development of the Preschooler

View Set

Chapter 45 Care of a Patient With a Gastrointestinal Disorder

View Set

20/21_GRPS_ELECTIVE_Computer Applications - Office 2016_A_IC UNIT 1

View Set

Chapter 29 Questions - Sexual Assault

View Set