Question: All the following are properties of asymmetric key encryption, except

Answer Options:

It is computationally simple
It makes it easy to exchange the encryption key
It uses two keys
The key used for encryption cannot be used for decryption

Answer: It is computationally simple

 

Question: The most popular implementation of asymmetric key encryption is

Answer Options:

International Data Encryption Algorithm (IDEA)
Rivest, Shamir and Adleman (RSA)
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)

Answer: Rivest, Shamir and Adleman (RSA)

 

Question: Most commercial encryption technologies such as SSL and VPN

Answer Options:

Use only asymmetric key encryption
Use only symmetric key encryption
Combine the best features of symmetric and asymmetric key encryption

Answer: Combine the best features of symmetric and asymmetric key encryption

 

Question: The most common control used to ensure availability of outgoing information is

Answer Options:

Encryption
Firewall
Redundancy
De-militarized zone

Answer: Redundancy

 

Question: Redundancy is

Answer Options:

Hiding information to provide confidentiality
The provision of surplus service capacity to improve availability
None of the above
Scheduling periodic maintenance to improve availability

Answer: The provision of surplus service capacity to improve availability

 

Question: An organization maintains multiple network connections to the Internet. This is an example of

Answer Options:

Modulation
Patching
Encryption
Redundancy

Answer: Redundancy

 

Question: A mobile worker requires secure access to corporate business applications from his hotel room. The most suitable encryption technology for this purpose is

Answer Options:

Transport Layer Security (TLS)
Virtual Private Network (VPN)
Digital Signature
Secure Shell (SSH)

Answer: Virtual Private Network (VPN)

 

Question: The contribution of the OSI model was that: It helped develop the technologies used for reliable data delivery. It helped develop the technologies used for signaling. It helped specify the concept of layers in data communication. It helped develop the technology used for routing.

Answer: It helped specify the concept of layers in data communication.

 

Question: The presentation layer in the OSI model is responsible for: Error control. Syntax conversion from host-specific syntax for network transfer. Specifying end user needs. Preventing unauthorized file access.

Answer: Syntax conversion from host-specific syntax for network transfer.

 

Question: The session layer in the OSI model is responsible for: Error control. Creating and terminating connections. Specifying end user needs. Tracking cookies.

Answer: Creating and terminating connections.

 

Question: At which layer of the OSI model are you likely to see acknowledgments of data segments? Presentation. Network. Application. Transport.

Answer: Transport.

 

Question: A protocol is a set of rules that: Define layers. Arrange functionality of components. Permit information systems to exchange information with each other. Break down user data into small segments.

Answer: Permit information systems to exchange information with each other.

 

Question: A unique feature of the Internet compared to landline phone and traditional cable TV networks is that: The Internet has a higher data transfer rate. The Internet was operational long before phone and TV networks. The Internet uses a common packet format to transfer data from any application. The Internet can be used to transmit information.

Answer: The Internet uses a common packet format to transfer data from any application.

 

Question: A technology defined at the Data Link layer is: Ethernet. TCP. SMTP. IP.

Answer: Ethernet.

 

Question: The OSI model has ____ layers.

Answer: 7.

 

Question: The TCP/IP stack has ____ layers.

Answer: 4

 

Question: Florence discovers Florence’s finest nursery and as she is admiring the flowers growing out of soil in the ground. She stops and wonders what is true about real/personal property. She concludes?

Answer Options:

Some real property can be converted to personal property.
Property right in personal property is the same as property right in real property.
A patent right is not personal property.
Real property can never be converted into personal property.

Answer: Some real property can be converted to personal property.