Category MSTM 5003 Computer And Network Security N2A

Module 5 Quiz

1.Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?Near field communication (NFC) 2.An advantage of Wired Equivalent Privacy (WEP) is that it can be trusted alone…

Module 4 Quiz

1.Which of the following is NOT a class of client/server processing?network-based processing 2.An advantage of an intranet-based approach to corporate computing is:all of the above 3.A computer that houses information for manipulation by networked clients is a __________.server 4.Advantages of…

Module 3 Quiz

1.Which type of certificate authority is maintained and controlled by the company that implemented it?In-house certification authority (CA) 2.A digital certificate binds an individual’s identity to a public key.True 3.A public key infrastructure __________.provides all of the components needed for…

Module 2 Quiz

1What step can be taken to evaluate the effectiveness of the security measures in place at an organization?Perform a vulnerability assessment. 2.Which term describes a legal agreement between partners establishing the terms, conditions, and expectations of the relationship between the…

Module 1 Quiz

1.Into which threat category does information warfare fall?Highly structured 2.How did the Code Red worm spread?It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month. 3.How long did it take for…