Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 3 Q&A

1:

Standards for digital IDs and certificates are defined in which of the following documents?

  1. RFC 509

  2. CCITT X.509

  3. RFC 905

  4. CCITT X.905

A1:

Answer: b. The International Telecommunications Union (ITU-T), formerly known as CCITT, provides the CCITT X.509 standard for certificates.

2:

List four parameters of a digital ID.

A2:

Answer: Parameters of a digital ID include version number, serial number, expiration date, and public key.

3:

A host IDS can be embedded in a networking device, a standalone appliance, or a module monitoring the network traffic. True or False?

A3:

Answer: False. A host IDS is a server-specific agent that runs on a server.

4:

Hardware keys are examples of which of the following?

  1. Firewalls

  2. PC cardbased solutions

  3. Digital IDs

  4. Biometrics

A4:

Answer: b. Hardware keys are examples of PC cardbased solutions.

5:

What processes are covered in physical security policies?

A5:

Answer: Physical security policies cover internal and external security measures, disaster-recovery plans, and personnel training.

6:

List two protocols that can be used for encrypted logins.

A6:

Answer: Secure Shell Protocol (SSH), Kerberos, Secure Socket Layer (SSL), and Transport Layer Security (TLS) can be used for encrypted logins.

7:

Which three functional areas can be connected to a firewall?

A7:

Answer: The three functional areas that can be connected to a firewall are private networks, public networks, and the DMZ networks.

8:

Which of the following are default PIX firewall interfaces?

  1. Inside

  2. Encrypted

  3. Outside

  4. Virtual private network (VPN)

A8:

Answer: a and c. The inside interface of the PIX is connected to a private or corporate intranet. The outside interface is typically connected to the Internet.

9:

What is file encryption?

A9:

Answer: File encryption is a technique that can be used to protect and preserve the integrity of your data locally on your workstation by encrypting the files.

10:

List four of the most common biometric technologies.A10:

Answer: The most common biometric technologies are fingerprint scanning, voice recognition, face recognition, typing biometrics, and signature recognition.


/ 196