Query
1.1.Which of the next is step one within the digital
signature course of the place Mike sends a message to Sophie? (Factors : 5)
A message digest of
Mike’s message is calculated utilizing a hashing algorithm
Sophie compares the
message digest she calculated to Mikes’s message
Sophie encrypts Mike’s
message with Mike’s public key
The message digest is
encrypted by Mike’s personal key
Query
2.2.Which of the next is described as a 64-bit block
cipher composed of a 16-round Feistel community and key-dependent S-box
features? (Factors : 5)
Twofish
RC4
Blowfish
Rijndael
Query
three.three.Which kind of perform is utilized in cryptography? (Factors
: 5)
Not AND
Permutation
NOR
X-box
Query
four.four.Which of the next is often used for verifying message
integrity? (Factors : 5)
Registration authority
CRL
Pseudorandom quantity
generator
Hashing perform
Query
5.5.Which of the next is NOT a crucial purpose of
info safety? (Factors : 5)
Confidentiality
Scalability
Authentication
Nonrepudiation
Query
6.6.What time period is given to a tool that’s designed to
generate radio alerts, not together with these from the antenna? (Factors :
5)
oscillator
conductive medium
intentional radiator
EIRP
Query
7.7.What’s a possible drawback with having too many APs in
a given space? (Factors : 5)
Refraction
Fading
Multipath
Co-channel interference
Query
eight.eight.Which digital sign modulation technique is a binary
modulation approach during which the service sign’s frequency is modified
to symbolize a 1 or zero bit? (Factors : 5)
ASK
FSK
PSK
FDM
Query
9.9.Which of the next is true about RF transmissions?
(Factors : 5)
EM radiation is
measured in volts
Frequency has an
inverse relationship with wavelength
Frequency is the
distance between waves
Cooler objects produce
higher-frequency radiation than hotter objects
Query
10.10.What’s used to transform an analog RF sign into
digital format? (Factors : 5)
spectrum
EIRP
modulator
service
Query
11.11.What is taken into account to be one of many largest weaknesses
of WEP? (Factors : 5)
24-bit initialization
vector
RC4 encryption
128-bit key
Kerberos authentication
Query
12.12.Wherein kind of assault do attackers intercept the
transmissions of two speaking nodes with out the consumer’s information?
(Factors : 5)
Rogue gadget
Wardriver
Man-in-the-middle
Brute pressure
Query
13.13.Which of the next is true about IEEE 802.11i?
(Factors : 5)
It makes use of WEP2 for
authentication and encryption
It makes use of a symmetric
block cipher for encryption
Temporal key integrity
protocol is used for encryption
It makes use of PMK to generate
knowledge encryption keys
Query
14.14.Which of the next is true about wardriving? (Factors
: 5)
Attackers use RF
monitor mode
The could be very
costly
The software program could be very
costly
Their purpose is solely to
hijack a connection
Query
15.15.What’s a WNIC’s equal of a NIC’s promiscuous
mode? (Factors : 5)
Energetic scan mode
RF monitor mode
Passive assault mode
Auto-capture mode
Query
16.16.Which kind of IDPS can have the issue of getting
disparate programs to work in a coordinated trend? (Factors : 5)
inline
Host-based
Hybrid
Community-based
Query
17.17.Which of the next is an IDPS safety greatest
observe? (Factors : 5)
to stop false
positives, solely take a look at the IDPS at preliminary configuration
communication between
IDPS parts must be encrypted
all sensors must be
assigned IP addresses
log recordsdata for HIDPSs
must be saved native
Query
18.18.Which of the next is NOT a typical IDPS
element? (Factors : 5)
Community sensors
Command console
Database server
Web gateway
Query
19.19.Which of the next is NOT a way utilized by passive
sensors to watch visitors? (Factors : 5)
Spanning port
Community faucet
Packet filter
load balancer
Query
20.20.The place is a host-based IDPS agent usually positioned?
(Factors : 5)
On a workstation or
server
At Web gateways
Between distant customers
and inside community
Between two subnets