100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+ $7.99   Add to cart

Exam (elaborations)

Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+

 2 views  0 purchase
  • Course
  • NTA chapter 6
  • Institution
  • NTA Chapter 6

Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+ Using encryption to prevent others from understanding your communication is a security technique that provides: - Answers data confidentiality. Malware is a generic term for software: - Answers whose specific in...

[Show more]

Preview 2 out of 5  pages

  • September 29, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • NTA chapter 6
  • NTA chapter 6
avatar-seller
TutorJosh
Test Bank Questions and Answers for National Tutoring Association Chapter 6 Graded A+

Using encryption to prevent others from understanding your communication is a security technique that
provides: - Answers data confidentiality.

Malware is a generic term for software: - Answers whose specific intent is to harm computer systems.

What is the term for a private network that allows selected access to outsiders only after they provide
authentication information? - Answers Extranet

Which of the following terms is associated with the practice of hiding internal IP addresses from the
external network? - Answers Network Address Translation (NAT)

Which choice correctly describes security in relation to networking? - Answers Security is the set of
procedures designed to protect transmitted and stored information, as well as network resources.

Which of the following is an advantage of "Bring Your Own Device" (BYOD) for businesses? - Answers
The IT department can reduce its costs by allowing employees to support their own devices.

In which of the following is one key used to encrypt and decrypt messages? - Answers Symmetric-key
encryption

Which choice correctly describes asymmetric-key encryption? - Answers It is very slow, and the public
key is distributed because the private key stays secure with the user.

Which of the following should you implement in order to isolate a group of computers to which access
to certain protocols is prohibited, and to help reduce network traffic by balancing the load between
network segments? - Answers A virtual LAN (VLAN)

If Internet access is required and a network is located behind a proxy server, how can you ensure that
users have access to Internet services that use less-common ports? - Answers Make sure the network
has access to all Internet-related protocols used by the company by opening their associated ports at
the proxy server.

What type of network attack occurs when code is inserted secretly in an application or operating system
by developers to give them a networking port that allows illicit access into the system? - Answers Back-
door attack

Data Encryption Standard (DES), Triple DES and Advanced Encryption Standard (AES) are examples of: -
Answers symmetric-key algorithms.

A polymorphic virus: - Answers contains programming code enabling it to execute differently each time
it is run.

What is the term for a software application that can be used to store and manage multiple passwords? -
Answers Password manager

, Which of the following is responsible for verifying the legitimacy of a digital certificate? - Answers
Certificate authority (CA)

Cloud service providers face several security threats, one of which is known as hypervisor vulnerabilities.
A hypervisor is: - Answers a single piece of hardware that runs multiple operating systems, such as a
server that uses virtualization software to run Windows and Linux OS concurrently.

A protocol that encapsulates data packets into another packet is known as a: - Answers tunneling
protocol.

Which standard do digital certificates use? - Answers X.509

A network security audit should be conducted by: - Answers a party that is not responsible for
maintaining the network on a daily basis.

The science of biometrics: - Answers is an authentication technique.

What is the name for an algorithm that receives input from a random or pseudo-random number
generator and automatically creates a password? - Answers Password generator

A boot sector virus: - Answers is loaded into memory each time a system is started.

Which choice correctly describes symmetric-key encryption? - Answers It is very fast, and all recipients
and viewers must have the same key.

Which of the following is used by digital certificates to ensure that messages have not been altered
during transmission from senders? - Answers Digital signatures

Valid users can forget their passwords, especially when password changes are required. Which of the
following enables users to access their accounts after a specified interval if they lock themselves out? -
Answers Account reset

Which encryption method should you use for information that will not be decrypted or read? - Answers
Hash encryption

Which of the following generally comprises the corporate network backbone in a Virtual Private
Network (VPN)? - Answers The Internet

Network security is more challenging with the advent of "Bring Your Own Device" (BYOD). Which of the
following provides the tools necessary for businesses to manage the BYOD phenomenon? - Answers
Mobile device management (MDM) tools

Which of the following specifically attacks anti-virus software by disabling the virus detection software,
allowing another portion of the virus code to attack the system? - Answers Retro virus

Identity thieves send e-mail messages or make telephone calls in an effort to make people reveal
personal or financial information. This is an example of: - Answers phishing.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78252 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart