AHS 131 HIT CH. 7 & 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Class C, electrical

An electrical fire like that which would be found in a computer data closet is known as what type of fire?

Copies all files changed since the last full or incremental backup

An incremental backup

Rogue access point

An unauthorized AP is called

1

Anytime the contents of that file or changed, the archive bit exchange to blank meaning that this modified file now needs to be backed up

Alice's public key

If Bob wants to send a secure message to Alice using an asymmetric cryptography algorithm, the key he uses to encrypt the message is

Wi-Fi protected access to, WPA2

The two models for personal wireless security developed by the Wi-Fi Alliance or Wi-Fi protected access, WPA and

Closed-circuit television. CCTV

Using video cameras to transmit a signal to a specific and limited set of receivers is called blank

Temporal Integrity protocol, tkip

WPA replaces WEP with

Plain text

What is data called that is to be encrypted by inputting into an encryption algorithm

Electricity

Which of the following can be used to power a backup generator except

Weight

Which of the following human characteristics cannot be used by biometric identification?

How long will it take to finish the backup

Which of the following is a basic question to be asked regarding creating a data backup except

Use a short password so the computer can process it more quickly

Which of the following is a step in creating a strong password except

Mac addresses are in initially exchange between wireless devices in the AP in an unencrypted format

Which of the following is a vulnerability of MAC address filtering

Stop loss

Which of the following is not a basic security protection over information that cryptography can provide?

Most sites force users to create weak passwords, although they do not want to

Which of the following is not a reason users create weak passwords?

A spark to start the process

Which of the following is required for a fire to occur except blank

Advanced encryption standard

Which of the following is the strongest symmetric cryptographic algorithm

It is always running off its battery

Which of the following is true regarding and offline UPS except

WPA2

Which of the following provides the strongest security for a wireless network

Netgear

Which of the following would be a secure SSID

Hard based VPN s

Which of these types of VPNs have the best security

Prevent certain applications from launching that will consume too much power

A UPS can perform each of the following except blank

Main distribution frame, MDF

A blank is a wiring rat that is used to connect external network connections

Online UPS

A blank is always running off its battery while the main power runs the battery charger

Worm

A blank requires a user to transport it from one computer to another

Cost

A disadvantage of biometric readers is

Unsecured public network

A virtual private Network uses a blank for transmissions

Secure shell, SSH

Blank is an encrypted alternative to telnet

Point-to-point tunneling protocol, pptp

Blank is used as a VPN tunneling protocol

Deadbolt

Blank locks are found in commercial buildings and are different from residential door locks

Processes

Each of the following are used to protect information, Hardware, software, and Communications except blank

Local probe

Each of the following is a type of Wireless probe except

It requires a laptop computer to implement

Each of the following is true about a RADIUS client except

Confidentiality

Ensures that only authorized parties can view the information

Nonrepudiation

Proving that a user sent an email message is known as

Mobile devices

Security lighting can be installed on each of the following areas except blank

Private key cryptography

Symmetric cryptography algorithms are also called

Provides cryptographic services in Hardware instead of software

The Trusted platform module, TPM

It's usage creates a detectable pattern

The primary weakness of wired equivalent privacy WEP is


Set pelajaran terkait

NISSAN ROGUE VARIABLE COMPRESSION TURBO ENGINE

View Set

ITSW 1304 Excel Spreadsheet Ch. 5

View Set

Solving equations by graphing functions

View Set

Unit 3 Reformation and Wars of Religion//Morgan

View Set

CS 200: Exam 3 - Exam 1 & 2 Questions

View Set

BIO CHAPTER 8 POST TEST LAST MISSED

View Set