106) ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies
107) Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL, TLS, and S-HTTP.
108) Most antivirus software is effective against A) only those viruses active on the Internet and through e-mail. B) any virus. C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written.
109) In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) symmetric key encryption C) public key encryption D) private key encryption
110) A digital certificate system A) uses third-party CAs to validate a user’s identity. B) uses digital signatures to validate a user’s identity. C) uses tokens to validate a user’s identity. D) are used primarily by individuals for personal correspondence.
111) Downtime refers to periods of time in which a A) computer system is malfunctioning. B) computer system is not operational. C) corporation or organization is not operational. D) computer is not online.
112) Online transaction processing requires A) more processing time. B) a large server network. C) fault-tolerant computer systems. D) dedicated phone lines.
113) In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection
114) The development and use of methods to make computer systems recover more quickly after mishaps is called A) high availability computing. B) recovery oriented computing. C) fault tolerant computing. D) disaster recovery planning.
115) Smaller firms can outsource security functions to A) MISs B) CSOs C) MSSPs D) CAs