Firewalls can operate at all osi layers except which of them

Assignment Help Basic Computer Science
Reference no: EM131020732

1. (TCO 10) Secure hashing is also known as _____.

public-key cryptography

a message digest

Transport Layer Security

Secure Sockets Layer

IPSec

Question 2. 2. (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

RSA

Diffie Hellman

MD5

PSA

Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of the following?

7 - application

4 - transport

3 - network

2 - data link

1 - physical

Question 4. 4. (TCO 11) Four general techniques used by firewalls are object control, direction control, behavior control, and _____.

flow control

subject control

access control

audit control

authentication control

Question 5. 5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

software

remote procedure calls

agent technology

common interfaces

access to local audit records

Question 6. 6. (TCO 12) The Internet Engineering Task Force Intrusion Detection working group has developed a standard called the _____.

Intrusion Detection Standard

Intrusion Detection Framework

Intrusion Detection Data Model

Intrusion Detection Exchange Format

Intrusion Detection Data Format

Question 7. 7. (TCO 12) _____ intrusions are harder to detect than _____ intrusions.

Anomalous, misuse

Misuse, anomalous

Well-defined, unplanned

Well-planned, automated

Automated, well-planned

Question 8. 8. (TCO 13) Which form of malware is dependent on operating systems and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

Question 9. 9. (TCO 13) In which system life cycle phase should security policy be established?

Test and evaluation

Operations and maintenance

Requirements definition

Acquisition

Initiation

Question 10. 10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer.

An antivirus program

Malware

A firewall

A logic bomb

A trojan horse

Reference no: EM131020732

Questions Cloud

How much interest on interest did the company earn : Precision Engineering invested $110,000 at 6.5 percent interest, compounded annually for 4 years. How much interest on interest did the company earn over this period of time? The correct answer is $2,911.30, I am using a BA II Plus calculator, can yo..
Multi segment marketing : Multi segment marketing is likely to ____ and ____
What is the future value if payments are ordinary annuity : Suppose you are going to receive $13,300 per year for six years. The appropriate interest rate is 8.2 percent. What is the present value of the payments if they are in the form of an ordinary annuity? What is the present value if the payments are an ..
Is mary maximizing utility : Mary is buying corn chips and soda. She has 4 bags of corn chips and 5 bottles of soda in her shopping cart. The marginal utility of the fourth bag of corn chips is 10, and the marginal utility of the fifth bottle of soda is also 10. Is Mary maxi..
Firewalls can operate at all osi layers except which of them : In which system life cycle phase should security policy be established?
Two annuities have both equal present and future values : You are comparing two annuities that offer quarterly payments of $2,500 for five years and pay .75 percent interest per month. You will purchase one of these today with a single lump sum payment. These two annuities have both equal present and future..
Determining the level of soft drinks to consume : Consider the market for soft drinks. Suppose recent studies show that consumption of soft drinks results in significant health costs to society due to the ingestion of high levels of high fructose corn syrup. Currently consumers of soft drinks do ..
What is the yield to maturity of this bond : A Japanese company has a bond outstanding that sells for 86 percent of its ¥100,000 par value. The bond has a coupon rate of 4.5 percent paid annually and matures in 16 years. What is the yield to maturity of this bond?
Consider purchasing a new wood saw that costs : Consider purchasing a new wood saw that costs $40,000. The saw will generate revenues of $100,000 per year for five years. The cost of materials and labor needed to generate these revenues will total $60,000 per year, and other cash expenses will be ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd