Question 1 of 5
A network attack in which repeated attempts are made to guess user names and passwords using a file containing a long list of words is called:
A.a back-door attack.
B.a brute-force attack.
C.a dictionary attack.
D.a man-in-the-middle attack.
Question 2 of 5
The action of using one key to encrypt and decrypt a message is called:
Question 3 of 5
A network-level protocol that uses tunneling to encapsulate data packets into network packets is called:
B.Pretty Good Privacy (PGP).
C.remote access server (RAS).
D.Virtual Private Network (VPN).
Question 4 of 5
A server whose primary goal is to enable the secure creation and management of digital certificates is called:
A.a certificate authority (CA).
B.Data Encryption Standard (DES).
C.Public Key Infrastructure (PKI).
D.Virtual Network Computing (VNC).
Question 5 of 5
The practice of hiding internal IP addresses from the external network is called:
B.Network Address Translation (NAT).