Firewalls can operate at all osi layers except which of them

Assignment Help Basic Computer Science
Reference no: EM131020732

1. (TCO 10) Secure hashing is also known as _____.

public-key cryptography

a message digest

Transport Layer Security

Secure Sockets Layer

IPSec

Question 2. 2. (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

RSA

Diffie Hellman

MD5

PSA

Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of the following?

7 - application

4 - transport

3 - network

2 - data link

1 - physical

Question 4. 4. (TCO 11) Four general techniques used by firewalls are object control, direction control, behavior control, and _____.

flow control

subject control

access control

audit control

authentication control

Question 5. 5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

software

remote procedure calls

agent technology

common interfaces

access to local audit records

Question 6. 6. (TCO 12) The Internet Engineering Task Force Intrusion Detection working group has developed a standard called the _____.

Intrusion Detection Standard

Intrusion Detection Framework

Intrusion Detection Data Model

Intrusion Detection Exchange Format

Intrusion Detection Data Format

Question 7. 7. (TCO 12) _____ intrusions are harder to detect than _____ intrusions.

Anomalous, misuse

Misuse, anomalous

Well-defined, unplanned

Well-planned, automated

Automated, well-planned

Question 8. 8. (TCO 13) Which form of malware is dependent on operating systems and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

Question 9. 9. (TCO 13) In which system life cycle phase should security policy be established?

Test and evaluation

Operations and maintenance

Requirements definition

Acquisition

Initiation

Question 10. 10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer.

An antivirus program

Malware

A firewall

A logic bomb

A trojan horse

Reference no: EM131020732

Questions Cloud

How much interest on interest did the company earn : Precision Engineering invested $110,000 at 6.5 percent interest, compounded annually for 4 years. How much interest on interest did the company earn over this period of time? The correct answer is $2,911.30, I am using a BA II Plus calculator, can yo..
Multi segment marketing : Multi segment marketing is likely to ____ and ____
What is the future value if payments are ordinary annuity : Suppose you are going to receive $13,300 per year for six years. The appropriate interest rate is 8.2 percent. What is the present value of the payments if they are in the form of an ordinary annuity? What is the present value if the payments are an ..
Is mary maximizing utility : Mary is buying corn chips and soda. She has 4 bags of corn chips and 5 bottles of soda in her shopping cart. The marginal utility of the fourth bag of corn chips is 10, and the marginal utility of the fifth bottle of soda is also 10. Is Mary maxi..
Firewalls can operate at all osi layers except which of them : In which system life cycle phase should security policy be established?
Two annuities have both equal present and future values : You are comparing two annuities that offer quarterly payments of $2,500 for five years and pay .75 percent interest per month. You will purchase one of these today with a single lump sum payment. These two annuities have both equal present and future..
Determining the level of soft drinks to consume : Consider the market for soft drinks. Suppose recent studies show that consumption of soft drinks results in significant health costs to society due to the ingestion of high levels of high fructose corn syrup. Currently consumers of soft drinks do ..
What is the yield to maturity of this bond : A Japanese company has a bond outstanding that sells for 86 percent of its ¥100,000 par value. The bond has a coupon rate of 4.5 percent paid annually and matures in 16 years. What is the yield to maturity of this bond?
Consider purchasing a new wood saw that costs : Consider purchasing a new wood saw that costs $40,000. The saw will generate revenues of $100,000 per year for five years. The cost of materials and labor needed to generate these revenues will total $60,000 per year, and other cash expenses will be ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss the pros and cons of buying software

Are there any instances when a firm would pass up such software and decide to prepare custom code? If so, what are they?Discuss the pros and cons of buying software vs. creating custom software.

  Change arp entry in computer for mac address

Print your ARP cache table. Find a server on your local network. Change its ARP entry in your computer to point to your computer's MAC address. Print new ARP cache table. Now use the service and see what happens.

  What information was relevant and why

Research at least two articles on the topic of big data and its business impacts. Write a brief synthesis and summary of the two articles. How are the topics of the two articles related? What information was relevant and why?

  Analyze the use of gestures in ipads

Analyze the use of gestures in iPads. Address how users feel about gestures. Evaluate how users feel about the user input when it comes to filling out complicated forms on the iPad.

  Variety information sources to complete

The assignment requires the submission of a report detailing your solutions to the following tasks and contributes 50% to your overall module mark.

  Look through a newspaper and circulars for advertisement

Look through a newspaper and circulars for advertisement for training and education in security- and technology-related areas. What are the costs of the advertised security training? Network certification ? General computer training?

  Prove true a similar statement for octal representation

suppose a 4n-bit number B is represented by an n-digit hexadecimal number H. Prove that the two's complement of B is represented by the 16's complement of H. Make and prove true a similar statement for octal representation.

  Modify the test scores program from the above debug

Also print a report of the each student's test grades, average and final grade as a table, and then print the averages of each Test and overall Test Average, as well as highest Test Grade of all Tests and the student with the highest class grade.

  Class that implements an fcfs schedule

Create a controller class that implements an FCFS schedule and instantiates 5 objects of each class and runs each object. Take the start and stop time for each thread and print out the time it takes to run.

  Propose a solution to the conflicts

Consider at least two (2) software products that you use or have used in the past. Provide at least two (2) examples in which ease of learning conflicted with ease of use. Propose a solution to the conflicts that you have indicated. Justify your resp..

  Develop and defend a business continuity proposal

Task goals · Develop and defend a business continuity proposal based on sound research for the information technology needs of an organization.

  Discuss the term scalability

Discuss the term scalability. What does it mean?Why is it an important network design goal?What are some challenges designers face when designing for scalability.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd