Premium Essay

Nt1330 Unit 3 Quiz

Submitted By
Words 1535
Pages 7
Question 1
Correct
Mark 3.00 out of 3.00 Flag question
Question text
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity is _________ . Select one: a. accountability b. authenticity c. privacy d. integrity
Feedback
Your answer is correct.
The correct answer is: privacy
Question 2
Correct
Mark 3.00 out of 3.00 Flag question
Question text
._________ attacks attempt to alter system resources or affect their operation.

Select one: a. .Active b. Release of message content c. Passive d. Traffic analysis
Feedback
Your answer is correct.
The correct answer is: .Active
Question 3
Correct
Mark 3.00 out of 3.00 Flag question
Question text
The most common key length in modern …show more content…
Select one: a.
ISOC
b. ITU-T c.
FIPS
d.
ISO
Feedback
Your answer is correct.
The correct answer is:
ISOC
Question 17
Correct
Mark 3.00 out of 3.00 Flag question
Question text f the message includes a _________ the receiver is assured that the message has not been delayed beyond that normally expected for network transit.

Select one: a. error detection code b. shared key c. timestamp d. .sequence number
Feedback
Your answer is correct.
The correct answer is: timestamp
Question 18
Correct
Mark 3.00 out of 3.00 Flag question
Question text
The purpose of a _________ is to produce a "fingerprint" of a file, message, or other block of data.

Select one: a. public key b. message authentication c. hash function d. cipher encryption
Feedback
Your answer is correct.
The correct answer is: hash

Similar Documents

Premium Essay

Nt1330 Unit 3 Quiz Essay

...1. When to use standard I/O (A) When working with disk or terminal files (B) When you need to fetch file metadata [a] (C) None (D) All the above 2. Difference between getc and fgetc (a) fgetc can be implemented as macro, where as getc cannot be implemented as macro (b) getc can be implemented as macro, where as fgetc cannot be implemented as a macro [b] (c) getc is used to write a character and fgetc to read a character (d) fgetc to write a character and getc to read a character 3. rewinddir returns (a) 0 (b) -1 [c] (c) no value (d) error (4) The functions which change the execution mode of the program from user mode to kernel mode are known as (a)...

Words: 1393 - Pages: 6

Premium Essay

Nt 1210

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18