Question: All the following are properties of asymmetric key encryption, except
Answer Options:
Answer: It is computationally simple
Question: The most popular implementation of asymmetric key encryption is
Answer Options:
Answer: Rivest, Shamir and Adleman (RSA)
Question: Most commercial encryption technologies such as SSL and VPN
Answer Options:
Answer: Combine the best features of symmetric and asymmetric key encryption
Question: The most common control used to ensure availability of outgoing information is
Answer Options:
Answer: Redundancy
Question: Redundancy is
Answer Options:
Answer: The provision of surplus service capacity to improve availability
Question: An organization maintains multiple network connections to the Internet. This is an example of
Answer Options:
Answer: Redundancy
Question: A mobile worker requires secure access to corporate business applications from his hotel room. The most suitable encryption technology for this purpose is
Answer Options:
Answer: Virtual Private Network (VPN)
Question: The contribution of the OSI model was that: It helped develop the technologies used for reliable data delivery. It helped develop the technologies used for signaling. It helped specify the concept of layers in data communication. It helped develop the technology used for routing.
Answer: It helped specify the concept of layers in data communication.
Question: The presentation layer in the OSI model is responsible for: Error control. Syntax conversion from host-specific syntax for network transfer. Specifying end user needs. Preventing unauthorized file access.
Answer: Syntax conversion from host-specific syntax for network transfer.
Question: The session layer in the OSI model is responsible for: Error control. Creating and terminating connections. Specifying end user needs. Tracking cookies.
Answer: Creating and terminating connections.
Question: At which layer of the OSI model are you likely to see acknowledgments of data segments? Presentation. Network. Application. Transport.
Answer: Transport.
Question: A protocol is a set of rules that: Define layers. Arrange functionality of components. Permit information systems to exchange information with each other. Break down user data into small segments.
Answer: Permit information systems to exchange information with each other.
Question: A unique feature of the Internet compared to landline phone and traditional cable TV networks is that: The Internet has a higher data transfer rate. The Internet was operational long before phone and TV networks. The Internet uses a common packet format to transfer data from any application. The Internet can be used to transmit information.
Answer: The Internet uses a common packet format to transfer data from any application.
Question: A technology defined at the Data Link layer is: Ethernet. TCP. SMTP. IP.
Answer: Ethernet.
Question: The OSI model has ____ layers.
Answer: 7.
Question: The TCP/IP stack has ____ layers.
Answer: 4
Question: Florence discovers Florence’s finest nursery and as she is admiring the flowers growing out of soil in the ground. She stops and wonders what is true about real/personal property. She concludes?
Answer Options:
Answer: Some real property can be converted to personal property.