Additional Information

Site Information

 Loading... Please wait...

SEC 280 Final Exam with Answers

$22.99

Product Description

SEC 280 SEC280 Week 8 Final Exam Answers

Question 1.1. (TCO 2) When creating a password, users tend to use _____ (Points : 4)

Question 2.2. (TCO 2) Social engineers attempt to exploit the natural tendencies of people. They do this by _____. (Points : 4)

Question 3.3. (TCO 2) What is IPsec? (Points : 4)

Question 4.4. (TCO 2) What is PKCS? (Points : 4)

Question 5.5. (TCO 2) What is Wired Equivalent Privacy (WEP)? (Points : 4)

Question 6.6. (TCO 2) What is CMP? (Points : 4)

Question 7.7. (TCO 3) Network components connected to the same cable are often called "the backbone" in which topology? (Points : 4)

Question 8.8. (TCO 3) What is the main difference between TCP and UDP packets? (Points : 4)

Question 9.9. (TCO 3) Unfortunately, hackers abuse the ICMP protocol by using it to _____. (Points : 4)

Question 10.10. (TCO 3) Which of the following is a benefit provided by Network Address Translation (NAT)? (Points : 4)

Question 11.11. (TCO 3) Which protocol is based on transferring data in fixed-size packets? (The fixed packet sizes help ensure that no single data type monopolizes the available bandwidth.) (Points : 4)

Question 12.12. (TCO 3) Which transport layer protocol is connection oriented? (Points : 4)

Question 13.13. (TCO 3) Which protocol is responsible for resolving an IP address to a MAC address? (Points : 4)

Question 14.14. (TCO 4) A way of backing up cryptographic keys is by _____. (Points : 4)

Question 15.15. (TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one? (Points : 4)

Question 16.16. (TCO 4) Outsourced CAs are different from public CAs in what way? (Points : 4)

Question 17.17. (TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____. (Points : 4)

Question 18.18. (TCO 4) Keeping a copy of an encryption key with a trusted third party is known as _____. (Points : 4)

Question 19.19. (TCO 6) Which device converts analog signals to digital signals and vice versa? (Points : 4)

Question 20.20. (TCO 6) A hub operates at which of the following? (Points : 4)

Question 21.21. (TCO 6) The following are steps in securing a workstation EXCEPT _____. (Points : 4)

Question 22.22. (TCO 8) Centralized monitoring of the health of the network is the function of a(n) _____. (Points : 4)

Question 23.23. (TCO 8) The electronic signatures in the Global and National Commerce Act _____. (Points : 4)

Question 24.24. (TCO 8) What do you call a law based on previous events or precedents? (Points : 4)

Question 25.25. (TCO 8) What is the Convention on Cybercrime? (Points : 4)

Find Similar Products by Category

Click the button below to add the SEC 280 Final Exam with Answers to your wish list.