Chat with us, powered by LiveChat Saint COM530 week 4 quiz | Writedemy

Saint COM530 week 4 quiz

Saint COM530 week 4 quiz

Question

Question 1.1.Which of the following is the first step in the digital signature process where Mike sends a message to Sophie? (Points : 5)

 A message digest of Mike’s message is calculated using a hashing algorithm
 Sophie compares the message digest she calculated to Mikes’s message
 Sophie encrypts Mike’s message with Mike’s public key
 The message digest is encrypted by Mike’s private key

Question 2.2.Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions? (Points : 5)

 Twofish
 RC4
 Blowfish
 Rijndael

Question 3.3.Which type of function is used in cryptography? (Points : 5)

 Not AND
 Permutation
 NOR
 X-box

Question 4.4.Which of the following is commonly used for verifying message integrity? (Points : 5)

 Registration authority
 CRL
 Pseudorandom number generator
 Hashing function

Question 5.5.Which of the following is NOT a critical goal of information security? (Points : 5)

 Confidentiality
 Scalability
 Authentication
 Nonrepudiation

Question 6.6.What term is given to a device that is designed to generate radio signals, not including those from the antenna? (Points : 5)

 oscillator
 conductive medium
 intentional radiator
 EIRP

Question 7.7.What is a potential problem with having too many APs in a given area? (Points : 5)

 Refraction
 Fading
 Multipath
 Co-channel interference

Question 8.8.Which digital signal modulation method is a binary modulation technique in which the carrier signal’s frequency is changed to represent a 1 or 0 bit? (Points : 5)

 ASK
 FSK
 PSK
 FDM

Question 9.9.Which of the following is true about RF transmissions? (Points : 5)

 EM radiation is measured in volts
 Frequency has an inverse relationship with wavelength
 Frequency is the distance between waves
 Cooler objects produce higher-frequency radiation than hotter objects

Question 10.10.What is used to convert an analog RF signal into digital format? (Points : 5)

 spectrum
 EIRP
 modulator
 carrier

Question 11.11.What is considered to be one of the biggest weaknesses of WEP? (Points : 5)

 24-bit initialization vector
 RC4 encryption
 128-bit key
 Kerberos authentication

Question 12.12.In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge? (Points : 5)

 Rogue device
 Wardriver
 Man-in-the-middle
 Brute force

Question 13.13.Which of the following is true about IEEE 802.11i? (Points : 5)

 It uses WEP2 for authentication and encryption
 It uses a symmetric block cipher for encryption
 Temporal key integrity protocol is used for encryption
 It uses PMK to generate data encryption keys

Question 14.14.Which of the following is true about wardriving? (Points : 5)

 Attackers use RF monitor mode
 The hardware is very expensive
 The software is very expensive
 Their goal is simply to hijack a connection

Question 15.15.What is a WNIC’s equivalent of a NIC’s promiscuous mode? (Points : 5)

 Active scan mode
 RF monitor mode
 Passive attack mode
 Auto-capture mode

Question 16.16.Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion? (Points : 5)

 inline
 Host-based
 Hybrid
 Network-based

Question 17.17.Which of the following is an IDPS security best practice? (Points : 5)

 to prevent false positives, only test the IDPS at initial configuration
 communication between IDPS components should be encrypted
 all sensors should be assigned IP addresses
 log files for HIDPSs should be kept local

Question 18.18.Which of the following is NOT a typical IDPS component? (Points : 5)

 Network sensors
 Command console
 Database server
 Internet gateway

Question 19.19.Which of the following is NOT a method used by passive sensors to monitor traffic? (Points : 5)

 Spanning port
 Network tap
 Packet filter
 load balancer

Question 20.20.Where is a host-based IDPS agent typically placed? (Points : 5)

 On a workstation or server
 At Internet gateways
 Between remote users and internal network
 Between two subnets

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order