Question 1.1.Which of the following is the first step in the digital signature process where Mike sends a message to Sophie? (Points : 5)
A message digest of Mike’s message is calculated using a hashing algorithm
Sophie compares the message digest she calculated to Mikes’s message
Sophie encrypts Mike’s message with Mike’s public key
The message digest is encrypted by Mike’s private key
Question 2.2.Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions? (Points : 5)
Twofish
RC4
Blowfish
Rijndael
Question 3.3.Which type of function is used in cryptography? (Points : 5)
Not AND
Permutation
NOR
X-box
Question 4.4.Which of the following is commonly used for verifying message integrity? (Points : 5)
Registration authority
CRL
Pseudorandom number generator
Hashing function
Question 5.5.Which of the following is NOT a critical goal of information security? (Points : 5)
Question 8.8.Which digital signal modulation method is a binary modulation technique in which the carrier signal’s frequency is changed to represent a 1 or 0 bit? (Points : 5)
ASK
FSK
PSK
FDM
Question 9.9.Which of the following is true about RF transmissions? (Points : 5)
EM radiation is measured in volts
Frequency has an inverse relationship with wavelength
Frequency is the distance between waves
Cooler objects produce higher-frequency radiation than hotter objects
Question 10.10.What is used to convert an analog RF signal into digital format? (Points : 5)
spectrum
EIRP
modulator
carrier
Question 11.11.What is considered to be one of the biggest weaknesses of WEP? (Points : 5)
Question 12.12.In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge? (Points : 5)
Rogue device
Wardriver
Man-in-the-middle
Brute force
Question 13.13.Which of the following is true about IEEE 802.11i? (Points : 5)
It uses WEP2 for authentication and encryption
It uses a symmetric block cipher for encryption
Temporal key integrity protocol is used for encryption
It uses PMK to generate data encryption keys
Question 14.14.Which of the following is true about wardriving? (Points : 5)
Attackers use RF monitor mode
The hardware is very expensive
The software is very expensive
Their goal is simply to hijack a connection
Question 15.15.What is a WNIC’s equivalent of a NIC’s promiscuous mode? (Points : 5)
Question 16.16.Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion? (Points : 5)
inline
Host-based
Hybrid
Network-based
Question 17.17.Which of the following is an IDPS security best practice? (Points : 5)
to prevent false positives, only test the IDPS at initial configuration
communication between IDPS components should be encrypted
all sensors should be assigned IP addresses
log files for HIDPSs should be kept local
Question 18.18.Which of the following is NOT a typical IDPS component? (Points : 5)
Network sensors
Command console
Database server
Internet gateway
Question 19.19.Which of the following is NOT a method used by passive sensors to monitor traffic? (Points : 5)
Spanning port
Network tap
Packet filter
load balancer
Question 20.20.Where is a host-based IDPS agent typically placed? (Points : 5)
On a workstation or server
At Internet gateways
Between remote users and internal network
Between two subnets
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need an answer to this or any other questions?
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will
direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.