Login
Remember
Register
MCQ Village Q&A
Questions
Unanswered
Categories
Ask a Question
Ask a Question
Recent questions in Computer Science
0
votes
1
answer
110
views
______ profile is used for a trusted home or office network?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
85
views
Identify two components of cryptography.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
91
views
What is data encryption standard (DES)?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
103
views
Encrypting plaintext results in an unreadable language called _______.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
89
views
Digital signature can provide _________ for a network.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
97
views
Which protocol provides security at the transport layer level?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
154
views
What can be an accidental or Intentional error.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
68
views
IPSec is designed to provide protection at theĀ
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
138
views
Which of these uses public key encryption to secure channel over public Internet?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
88
views
Which is a longer version of a password, and in theory, a more secured one.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
102
views
Which process verifies if the identified user is the real owner of his/her identify ?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
305
views
Many network applications and protocols have security problems that are fixed over time by using devices like
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
96
views
Which process determines whether an entity is allowed access to a given asset or resource.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
107
views
Which of the following define the ability to verify that an e-mail message received has not
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
57
views
What controls or limits access of critical information to certain individuals or group of individuals?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
88
views
A secured way to connect to the remote host is
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
95
views
Which one of the following is an active attack?
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
65
views
__________ is the encryption which may also be referred to as the shared key.
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
66
views
WPA2 is used for security in
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
0
votes
1
answer
78
views
One that makes a network service unusable, usually by overloading the server or networks is
asked
Sep 9, 2023
in
Security Concepts
by
Admin
(
0
points)
security-concepts
Page:
« prev
1
...
58
59
60
61
62
63
64
...
104
next »
3.0k
questions
3.0k
answers
0
comments
76
users
Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
Recent questions in Computer Science
Ask a question:
...