Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

A stateful firewall maintains a __, which is a list of active connections.

The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A Day Among the Liars», The Sun, 23 August, 1885.
  2. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
  3. A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers.
  4. aı] eye, eyes, nice, white, kind
  5. A) В защиту прав, свобод и охраняемых законом интересов других лиц.
  6. A) Должно соответствовать требованиям, установленным для апелляционного постановления.

A. Routing table

B. Bridging table

C. State table

D. Connection table

E. Hub table

 

A _________-level proxy inspects the entire packet and makes access decisions based on the contents of the packet.

A. Circuit

B. Application

C. Proxy

D. Server

E. Physical

 

A datagram is called ______ at the physcial layer of OSI.

A. Bits

B. Segments

C. Frames

D. Packets

E. Bytes

 

24. A(n) ________ is a fancy term for a computer that has two network interfaces/

A. Proxy gateway

B. Duel-homed host

C. Routing workstation

D. NAT server

E. None of the statements

 

Is another term for a packet of digital information.

A. Footer

 

 

B. Header

C. Data

D. Datagram

E. Bits

 

Some _________ firewalls are able to examine the contents of packets as well as the headers for signs that they are legitimate.

A. Boundary

B. Stateful

C. Stateless

D. Personal

E. DMZ

 

27. What is one advantage of setting up a DMZ with two firewalls?

A. You can control where traffic goes in the three networks

B. You can do stateful packet filtering

C. You can do load balancing

D. Improved network performance

E. All of the statements

 

Possibility of an incident or attack to cause damage to your enterprise

A. Risk

B. Virus

C. Security

D. Assets

E. Malware

 

One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations.

A. Authentication

B. Denial of service

C. Availability

D. Reliability

E. Confidentiality

 


Дата добавления: 2015-08-18; просмотров: 145 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
You can use ____________ to protect your computer from outsiders.| Match each term according to their meanings in Public-Key Cryptosystem

mybiblioteka.su - 2015-2024 год. (0.006 сек.)