Академический Документы
Профессиональный Документы
Культура Документы
Complete
1.00 points out of 1.00
Flag question
Question text
In addition to “What users know,” “What users have,” and “what users are,” what did the author
add to be able to authenticate a user?
Select one:
a. “What users should have”
b. “What users should think”
c. “What users can argue they should be”
d. “What users do”
Question 2
Complete
1.00 points out of 1.00
Flag question
Question text
Question 3
Complete
1.00 points out of 1.00
Flag question
Question text
A hub operates at
Select one:
a. Layer 1, the physical layer
b. Layer 2, the data link layer
c. Layer 2, the MAC layer
d. Layer 3, the network layer
Question 4
Complete
1.00 points out of 1.00
Flag question
Question text
_____ is the process by which each end of the data flow proves that they are who they say they
are.
Select one:
a. Integrity
b. Confidentiality
c. Authentication
d. WTLS
Question 5
Complete
1.00 points out of 1.00
Flag question
Question text
A(n) ____ is a network device that can be hardware, software, or a combination of both whose
purpose is to enforce a security policy across its connections to external networks such as the
Internet
Select one:
a. Blister pack
b. Switch
c. Server
d. Firewall
Question 6
Complete
1.00 points out of 1.00
Flag question
Question text
You are building a small network in the office. You will need to connect two different network
segments that have different network addresses. What device will you use to connect them?
Select one:
a. Hub
b. Router
c. Switch
d. Server
Question 7
Complete
1.00 points out of 1.00
Flag question
Question text
Question 8
Complete
1.00 points out of 1.00
Flag question
Question text
Which of the following protocols was designed for short-range wireless communication typically
with mobile phones?
Select one:
a. WPA2
b. Bluetooth
c. WEP
d. 802.11n
Question 9
Complete
1.00 points out of 1.00
Flag question
Question text
You are building a network and need to connect five computers in an office. They will be on the
same network segment and you should be able to perform some security functions such as port
address security. What device would you use to connect the computers?
Select one:
a. Switch
b. Hub
c. Router
d. Server
Question 10
Complete
1.00 points out of 1.00
Flag question
Question text
Question 11
Complete
1.00 points out of 1.00
Flag question
Question text
When an attacker uses Bluetooth to copy emails, contact lists, or other files on the device, it is
called
Select one:
a. Bluejacking
b. Bluesnarfing
c. Bluebugging
d. Bluehacking
Question 12
Complete
1.00 points out of 1.00
Flag question
Question text
Question 13
Complete
1.00 points out of 1.00
Flag question
Question text
Question 14
Complete
1.00 points out of 1.00
Flag question
Question text
Your boss wants you to suggest a secure way to connect to the corporate network from
home. You will have to connect through the Internet. What is a possible solution?
Select one:
a. Telnet
b. FTP
c. VPN
d. rsh
Question 15
Complete
1.00 points out of 1.00
Flag question
Question text
_____ is when an attacker uses Bluetooth to establish a connection to a device allowing success
to the full AT command set.
Select one:
a. Bluejacking
b. Bluesnarfing
c. Bluebugging
d. Bluehacking
Finish review
◄ Week 4 Discussion Question
Jump to...