100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
29-09-2024
Written in
2024/2025

Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+ Using encryption to prevent others from understanding your communication is a security technique that provides: - Answers data confidentiality. Malware is a generic term for software: - Answers whose specific intent is to harm computer systems. What is the term for a private network that allows selected access to outsiders only after they provide authentication information? - Answers Extranet Which of the following terms is associated with the practice of hiding internal IP addresses from the external network? - Answers Network Address Translation (NAT) Which choice correctly describes security in relation to networking? - Answers Security is the set of procedures designed to protect transmitted and stored information, as well as network resources. Which of the following is an advantage of "Bring Your Own Device" (BYOD) for businesses? - Answers The IT department can reduce its costs by allowing employees to support their own devices. In which of the following is one key used to encrypt and decrypt messages? - Answers Symmetric-key encryption Which choice correctly describes asymmetric-key encryption? - Answers It is very slow, and the public key is distributed because the private key stays secure with the user. Which of the following should you implement in order to isolate a group of computers to which access to certain protocols is prohibited, and to help reduce network traffic by balancing the load between network segments? - Answers A virtual LAN (VLAN) If Internet access is required and a network is located behind a proxy server, how can you ensure that users have access to Internet services that use less-common ports? - Answers Make sure the network has access to all Internet-related protocols used by the company by opening their associated ports at the proxy server. What type of network attack occurs when code is inserted secretly in an application or operating system by developers to give them a networking port that allows illicit access into the system? - Answers Back-door attack Data Encryption Standard (DES), Triple DES and Advanced Encryption Standard (AES) are examples of: - Answers symmetric-key algorithms. A polymorphic virus: - Answers contains programming code enabling it to execute differently each time it is run. What is the term for a software application that can be used to store and manage multiple passwords? - Answers Password manager Which of the following is responsible for verifying the legitimacy of a digital certificate? - Answers Certificate authority (CA)

Show more Read less
Institution
NTA Chapter 6
Course
NTA chapter 6









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NTA chapter 6
Course
NTA chapter 6

Document information

Uploaded on
September 29, 2024
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+

Using encryption to prevent others from understanding your communication is a security technique that
provides: - Answers data confidentiality.

Malware is a generic term for software: - Answers whose specific intent is to harm computer systems.

What is the term for a private network that allows selected access to outsiders only after they provide
authentication information? - Answers Extranet

Which of the following terms is associated with the practice of hiding internal IP addresses from the
external network? - Answers Network Address Translation (NAT)

Which choice correctly describes security in relation to networking? - Answers Security is the set of
procedures designed to protect transmitted and stored information, as well as network resources.

Which of the following is an advantage of "Bring Your Own Device" (BYOD) for businesses? - Answers
The IT department can reduce its costs by allowing employees to support their own devices.

In which of the following is one key used to encrypt and decrypt messages? - Answers Symmetric-key
encryption

Which choice correctly describes asymmetric-key encryption? - Answers It is very slow, and the public
key is distributed because the private key stays secure with the user.

Which of the following should you implement in order to isolate a group of computers to which access
to certain protocols is prohibited, and to help reduce network traffic by balancing the load between
network segments? - Answers A virtual LAN (VLAN)

If Internet access is required and a network is located behind a proxy server, how can you ensure that
users have access to Internet services that use less-common ports? - Answers Make sure the network
has access to all Internet-related protocols used by the company by opening their associated ports at
the proxy server.

What type of network attack occurs when code is inserted secretly in an application or operating system
by developers to give them a networking port that allows illicit access into the system? - Answers Back-
door attack

Data Encryption Standard (DES), Triple DES and Advanced Encryption Standard (AES) are examples of: -
Answers symmetric-key algorithms.

A polymorphic virus: - Answers contains programming code enabling it to execute differently each time
it is run.

What is the term for a software application that can be used to store and manage multiple passwords? -
Answers Password manager

, Which of the following is responsible for verifying the legitimacy of a digital certificate? - Answers
Certificate authority (CA)

Cloud service providers face several security threats, one of which is known as hypervisor vulnerabilities.
A hypervisor is: - Answers a single piece of hardware that runs multiple operating systems, such as a
server that uses virtualization software to run Windows and Linux OS concurrently.

A protocol that encapsulates data packets into another packet is known as a: - Answers tunneling
protocol.

Which standard do digital certificates use? - Answers X.509

A network security audit should be conducted by: - Answers a party that is not responsible for
maintaining the network on a daily basis.

The science of biometrics: - Answers is an authentication technique.

What is the name for an algorithm that receives input from a random or pseudo-random number
generator and automatically creates a password? - Answers Password generator

A boot sector virus: - Answers is loaded into memory each time a system is started.

Which choice correctly describes symmetric-key encryption? - Answers It is very fast, and all recipients
and viewers must have the same key.

Which of the following is used by digital certificates to ensure that messages have not been altered
during transmission from senders? - Answers Digital signatures

Valid users can forget their passwords, especially when password changes are required. Which of the
following enables users to access their accounts after a specified interval if they lock themselves out? -
Answers Account reset

Which encryption method should you use for information that will not be decrypted or read? - Answers
Hash encryption

Which of the following generally comprises the corporate network backbone in a Virtual Private
Network (VPN)? - Answers The Internet

Network security is more challenging with the advent of "Bring Your Own Device" (BYOD). Which of the
following provides the tools necessary for businesses to manage the BYOD phenomenon? - Answers
Mobile device management (MDM) tools

Which of the following specifically attacks anti-virus software by disabling the virus detection software,
allowing another portion of the virus code to attack the system? - Answers Retro virus

Identity thieves send e-mail messages or make telephone calls in an effort to make people reveal
personal or financial information. This is an example of: - Answers phishing.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
342
Member since
1 year
Number of followers
16
Documents
28610
Last sold
3 days ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions