Fill in the blank with the appropriate term. A is a technique to authenticate digital documents by using computer cryptography.
Fill in the blank with the appropriate term. is a prime example of a high-interaction honeypot.
Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?
A. dsniff
B. kismet
C. None
D. KisMAC
E. bridle
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?
A. Integrity
B. Non-repudiation
C. Confidentiality
D. Authentication
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?
A. Mesh
B. Ring
C. Bus
D. Star
Which of the following is the type of documented business rule for protecting information and the systems, which store and process the information
A. Information protection policy
B. Information protection document
C. Information storage policy
D. Information security policy
Which of the following IEEE standards defines a physical bus topology?
A. 802.4
B. 802.5
C. 802.6
D. 802.3
Which of the following help in estimating and totaling up the equivalent money value of the benefits and costs to the community of projects for establishing whether they are worthwhile? Each correct answer represents a complete solution. Choose all that apply.
A. Business Continuity Planning
B. Benefit-Cost Analysis
C. Disaster recovery
D. Cost-benefit analysis
Which of the following is a standard-based protocol that provides the highest level of VPN security?
A. L2TP
B. IP
C. PPP
D. IPSec
With which of the following forms of acknowledgment can the sender be informed by the data receiver about all segments that have arrived successfully?
A. Block Acknowledgment
B. Negative Acknowledgment
C. Cumulative Acknowledgment
D. Selective Acknowledgment