ISSC 341 Quiz 5

ISSC 341 Quiz 5

Author: Dannie Young


Question 1 of 5

1.0 Points

A network attack in which repeated attempts are made to guess user names and passwords using a file containing a long list of words is called:
 A.a back-door attack.

 B.a brute-force attack.

 C.a dictionary attack.

 D.a man-in-the-middle attack.


Question 2 of 5

1.0 Points

The action of using one key to encrypt and decrypt a message is called:
 A.hash encryption.

 B.PGP encryption.

 C.asymmetric-key encryption.

 D.symmetric-key encryption.


Question 3 of 5

1.0 Points

A network-level protocol that uses tunneling to encapsulate data packets into network packets is called:

 B.Pretty Good Privacy (PGP).

 C.remote access server (RAS).

 D.Virtual Private Network (VPN).


Question 4 of 5

1.0 Points

A server whose primary goal is to enable the secure creation and management of digital certificates is called:
 A.a certificate authority (CA).

 B.Data Encryption Standard (DES).

 C.Public Key Infrastructure (PKI).

 D.Virtual Network Computing (VNC).


Question 5 of 5

1.0 Points

The practice of hiding internal IP addresses from the external network is called:
 A.information caching.

 B.Network Address Translation (NAT).



See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

26 Sophia partners guarantee credit transfer.

226 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 21 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.