Question: Encryption is the process of
Answer Options:
Rendering information unreadable in such a way that authorized users may later make the information readable
Placing information in the de-militarized zone
Placing information behind a firewall
Adding a password to information
Answer: Rendering information unreadable in such a way that authorized users may later make the information readable
Question: Which of the following types of intellectual property have the least amount of time of exclusive rights?
A copyright.
A trademark.
They all have the same time period protection.
A patent.
Answer: A trademark.
Question: The name of this course’s theme song is which of the following?
If I had a Hammer
Boot Scootin’ Boogie
Udo Shuffle
Boogie Woogie Bugle Boy
Answer: Boot Scootin’ Boogie
Question: The Application layer in the TCP/IP stack is responsible for:
Specifying end user needs.
Identifying and locating the destination.
Segmentation and reassembly of packets.
Error control.
Answer: Specifying end user needs.
Question: All the following are properties of asymmetric key encryption, except
Answer Options:
It is computationally simple
It makes it easy to exchange the encryption key
It uses two keys
The key used for encryption cannot be used for decryption
Answer: It is computationally simple
Question: The most popular implementation of asymmetric key encryption is
Answer Options:
International Data Encryption Algorithm (IDEA)
Rivest, Shamir and Adleman (RSA)
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Answer: Rivest, Shamir and Adleman (RSA)
Question: Layering is the practice of:
Arranging functionality of components so that lower layers support the services of upper layers.
Breaking down user data into small segments.
Using one wire to carry multiple signals simultaneously.
Answer: Arranging functionality of components so that lower layers support the services of upper layers.
Question: Looking at your phone you notice which of the following?
You are looking at a product with multiple patents, multiple copyrights, and multiple trademarks.
It is impossible to have a product that includes copyrights, patents, and trademarks.
You are looking a product with a single patent.
You are looking at a product with a single patent and copyright.
Answer: You are looking at a product with multiple patents, multiple copyrights, and multiple trademarks.
Question: The Transport layer in the TCP/IP stack is responsible for:
Segmentation and reassembly of packets.
Specifying end user needs.
Error control.
Identifying and locating the destination.
Answer: Segmentation and reassembly of packets.
Question: The header of a data packet contains all of the following except:
User data.
Receiver address.
Sender address.
Packet size.
Answer: User data.
Question: Which of the following is not intellectual property?
A copyright.
A stock certificate.
Answer: A stock certificate.
Question: Business Data Communications refers to the movement of data from:
One computer application on a computer to another computer application on another computer.
One computer network to another computer network.
One computer to another computer.
One person to another person.
Answer: One computer application on a computer to another computer application on another computer.
Question: In symmetric key encryption
Answer Options:
None of the above
The key used for encryption is a mirror image of the key used for decryption
The same key is used for encryption and decryption
The key used for encryption is independent of the key used for decryption
Answer: The same key is used for encryption and decryption
Question: The Network layer in the TCP/IP stack is responsible for:
Error control.
Specifying end user needs.
Segmentation and reassembly of packets.
Identifying and locating the destination.
Answer: Identifying and locating the destination.
Question: In network security, a firewall is a device which lies between two networks and
Answer Options:
None of the above
Regulates the movement of network administrators from the external network to the internal network
Prevents fires in the external network from spreading to the internal network
Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
Answer: Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network