Firewalls can operate at all osi layers except which of them

Assignment Help Basic Computer Science
Reference no: EM131020732

1. (TCO 10) Secure hashing is also known as _____.

public-key cryptography

a message digest

Transport Layer Security

Secure Sockets Layer

IPSec

Question 2. 2. (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

RSA

Diffie Hellman

MD5

PSA

Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of the following?

7 - application

4 - transport

3 - network

2 - data link

1 - physical

Question 4. 4. (TCO 11) Four general techniques used by firewalls are object control, direction control, behavior control, and _____.

flow control

subject control

access control

audit control

authentication control

Question 5. 5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

software

remote procedure calls

agent technology

common interfaces

access to local audit records

Question 6. 6. (TCO 12) The Internet Engineering Task Force Intrusion Detection working group has developed a standard called the _____.

Intrusion Detection Standard

Intrusion Detection Framework

Intrusion Detection Data Model

Intrusion Detection Exchange Format

Intrusion Detection Data Format

Question 7. 7. (TCO 12) _____ intrusions are harder to detect than _____ intrusions.

Anomalous, misuse

Misuse, anomalous

Well-defined, unplanned

Well-planned, automated

Automated, well-planned

Question 8. 8. (TCO 13) Which form of malware is dependent on operating systems and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

Question 9. 9. (TCO 13) In which system life cycle phase should security policy be established?

Test and evaluation

Operations and maintenance

Requirements definition

Acquisition

Initiation

Question 10. 10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer.

An antivirus program

Malware

A firewall

A logic bomb

A trojan horse

Reference no: EM131020732

Questions Cloud

How much interest on interest did the company earn : Precision Engineering invested $110,000 at 6.5 percent interest, compounded annually for 4 years. How much interest on interest did the company earn over this period of time? The correct answer is $2,911.30, I am using a BA II Plus calculator, can yo..
Multi segment marketing : Multi segment marketing is likely to ____ and ____
What is the future value if payments are ordinary annuity : Suppose you are going to receive $13,300 per year for six years. The appropriate interest rate is 8.2 percent. What is the present value of the payments if they are in the form of an ordinary annuity? What is the present value if the payments are an ..
Is mary maximizing utility : Mary is buying corn chips and soda. She has 4 bags of corn chips and 5 bottles of soda in her shopping cart. The marginal utility of the fourth bag of corn chips is 10, and the marginal utility of the fifth bottle of soda is also 10. Is Mary maxi..
Firewalls can operate at all osi layers except which of them : In which system life cycle phase should security policy be established?
Two annuities have both equal present and future values : You are comparing two annuities that offer quarterly payments of $2,500 for five years and pay .75 percent interest per month. You will purchase one of these today with a single lump sum payment. These two annuities have both equal present and future..
Determining the level of soft drinks to consume : Consider the market for soft drinks. Suppose recent studies show that consumption of soft drinks results in significant health costs to society due to the ingestion of high levels of high fructose corn syrup. Currently consumers of soft drinks do ..
What is the yield to maturity of this bond : A Japanese company has a bond outstanding that sells for 86 percent of its ¥100,000 par value. The bond has a coupon rate of 4.5 percent paid annually and matures in 16 years. What is the yield to maturity of this bond?
Consider purchasing a new wood saw that costs : Consider purchasing a new wood saw that costs $40,000. The saw will generate revenues of $100,000 per year for five years. The cost of materials and labor needed to generate these revenues will total $60,000 per year, and other cash expenses will be ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Simulation: cpu scheduling algorithms comparison

Topic 1: SIMULATION: CPU SCHEDULING ALGORITHMS COMPARISON Overview: In this project, you'll implement and evaluate the following four different CPU scheduling algorithms by writing a CPU simulator. First Come First Serve (FCFS) The first come firs..

  Determine thickness if mass of tank is given

Determine x if the mass of the tank is 18 kg. The density of stainless-steel is 7920 kg/m^3. Note: use MATLAB script file to find x.

  A digital forensic investigator for a healthcare organizatio

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance informati..

  Explain the main characteristics of ipsec

Explain the main characteristics of IPSec. From a security point of view, describe some of the advantages and disadvantages of IPSec. How would you deploy IPSec in an IPV4 and IPV6 environment?

  Implementing erp systems

What do vendors seem to know and not know about implementing ERP systems? and How much influence should vendors have in an organization's ERP decision?

  How light source is treated during ray tracing processing

Typically, this setting is left at default until final renderings are being produced. To reduce gaps or facets in rendering which setting do you adjust?

  Structured and unstructured data

Structured and Unstructured Data

  Different types of switching used in data transmission

Compare or contrast the different types of switching used in data transmission. How many are there? What factors separate one from the other? Please elaborate.

  Research two asymmetric encryption algorithms

Research two asymmetric encryption algorithms. For each algorithm, list the key lengths used, outline the encryption process, and name at least one application that uses the algorithm. This assignment must be 1 page. Cite all sources/ reference..

  Find 1 article related to cloud-enabling technology

Find 1 article related to Cloud-Enabling Technology and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article, and (3) a brief statement of your thoughts on the article. These items should be no more than 1 page in l..

  Each of the conditional jump statements causes a jump to des

Assume for each part of this problem that the EAX register contains 00 00 00 4F and the doubleword referenced by value contains FF FF FF 38.

  Identify darwin two basic layers

1. Identify the four primary layers in the functional view of OS X ? 5. What is Darwin ? Identify Darwin's two basic layers ?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd