International Data Encryption Algorithm (IDEA) is a __________ block cipher.
Which of the following statements about DES (Data Encryption Standard) is true?
Which of the following is not a level of military data-classification system?
Which of the following port numbers is used by the HTTPS protocol for secure Web transmission?
Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following components come under the network layer of the OSI model?
Each correct answer represents a complete solution. Choose two.
Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."
The 802.11b wireless standard has a data transfer speed of up to ________.
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following actions might cause a privacy breach while surfing the Internet?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?
Which of the following types of virus is capable of changing its signature to avoid detection?
A ________ is a detailed step-by-step document that explains exactly what is to be done.
Which of the following rated systems of the Orange book has mandatory protection of the TCB?