Warning: include(/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95

Warning: include(): Failed opening '/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95
Saint COM530 week 4 quiz – RoyalCustomEssays

Saint COM530 week 4 quiz

ECONOMICS QUESTION PARAPHRASING NEEDED ON QUESTIONS
July 12, 2018
Unit 2 political commercial
July 12, 2018

Question
1.1.Which of the following is the first step in the digital
signature process where Mike sends a message to Sophie? (Points : 5)

A message digest of
Mike’s message is calculated using a hashing algorithm
Sophie compares the
message digest she calculated to Mikes’s message
Sophie encrypts Mike’s
message with Mike’s public key
The message digest is
encrypted by Mike’s private key

Question
2.2.Which of the following is described as a 64-bit block
cipher composed of a 16-round Feistel network and key-dependent S-box
functions? (Points : 5)

Twofish
RC4
Blowfish
Rijndael

Question
3.3.Which type of function is used in cryptography? (Points
: 5)

Not AND
Permutation
NOR
X-box

Question
4.4.Which of the following is commonly used for verifying message
integrity? (Points : 5)

Registration authority
CRL
Pseudorandom number
generator
Hashing function

Question
5.5.Which of the following is NOT a critical goal of
information security? (Points : 5)

Confidentiality
Scalability
Authentication
Nonrepudiation

Question
6.6.What term is given to a device that is designed to
generate radio signals, not including those from the antenna? (Points :
5)

oscillator
conductive medium
intentional radiator
EIRP

Question
7.7.What is a potential problem with having too many APs in
a given area? (Points : 5)

Refraction
Fading
Multipath
Co-channel interference

Question
8.8.Which digital signal modulation method is a binary
modulation technique in which the carrier signal’s frequency is changed
to represent a 1 or 0 bit? (Points : 5)

ASK
FSK
PSK
FDM

Question
9.9.Which of the following is true about RF transmissions?
(Points : 5)

EM radiation is
measured in volts
Frequency has an
inverse relationship with wavelength
Frequency is the
distance between waves
Cooler objects produce
higher-frequency radiation than hotter objects

Question
10.10.What is used to convert an analog RF signal into
digital format? (Points : 5)

spectrum
EIRP
modulator
carrier

Question
11.11.What is considered to be one of the biggest weaknesses
of WEP? (Points : 5)

24-bit initialization
vector
RC4 encryption
128-bit key
Kerberos authentication

Question
12.12.In which type of attack do attackers intercept the
transmissions of two communicating nodes without the user’s knowledge?
(Points : 5)

Rogue device
Wardriver
Man-in-the-middle
Brute force

Question
13.13.Which of the following is true about IEEE 802.11i?
(Points : 5)

It uses WEP2 for
authentication and encryption
It uses a symmetric
block cipher for encryption
Temporal key integrity
protocol is used for encryption
It uses PMK to generate
data encryption keys

Question
14.14.Which of the following is true about wardriving? (Points
: 5)

Attackers use RF
monitor mode
The hardware is very
expensive
The software is very
expensive
Their goal is simply to
hijack a connection

Question
15.15.What is a WNIC’s equivalent of a NIC’s promiscuous
mode? (Points : 5)

Active scan mode
RF monitor mode
Passive attack mode
Auto-capture mode

Question
16.16.Which type of IDPS can have the problem of getting
disparate systems to work in a coordinated fashion? (Points : 5)

inline
Host-based
Hybrid
Network-based

Question
17.17.Which of the following is an IDPS security best
practice? (Points : 5)

to prevent false
positives, only test the IDPS at initial configuration
communication between
IDPS components should be encrypted
all sensors should be
assigned IP addresses
log files for HIDPSs
should be kept local

Question
18.18.Which of the following is NOT a typical IDPS
component? (Points : 5)

Network sensors
Command console
Database server
Internet gateway

Question
19.19.Which of the following is NOT a method used by passive
sensors to monitor traffic? (Points : 5)

Spanning port
Network tap
Packet filter
load balancer

Question
20.20.Where is a host-based IDPS agent typically placed?
(Points : 5)

On a workstation or
server
At Internet gateways
Between remote users
and internal network
Between two subnets

Place Order