2023 1 TCO 6 encryption algorithms use the same key to encrypt and decrypt data between the sender and recipient | Assignments Online

2023 1 TCO 6 encryption algorithms use the same key to encrypt and decrypt data between the sender and recipient | Assignments Online

Assignments Online 2023 Business & Finance

1. (TCO 6) _____ encryption algorithms use the same key to encrypt and decrypt data between the sender and recipient. (Points : 4)
Symmetric
Asymmetric
Balanced
Single token

2. (TCO 6) The _____ encryption algorithm uses a key size of 128, 192, and 256 bits. (Points : 4)
DES
3DES
AES
WEP

3. (TCO 6) Which of the following algorithms is used to securely exchange IKE policy information? (Points : 4)
Diffie-Hellman
RSA signatures
Preshared keys
MD5

1. (TCO 2) Which of the following prompts indicates that you have booted (normally) into the IOS stored in Flash memory?(Points : 4)
 Router> > or ROMMON> (Boot)> ROM> 

 2. (TCO 2) Which of the following commands will encrypt line (con,vty,aux) passwords on a router? (Points : 4)
(config)# line password encryption (config)# service encryption password (config)# password service-encryption (config)# service password-encryption

 3. (TCO 2) Which does a router do with the packets whose destination addresses are unknown when no default gateway or network exists? (Points : 4)
The router will broadcast the packet. The router will send the packet back to the source. The router will discard the packet. The router will query the DNS root server for the destination address.

mode is _____. (Points : 4)
parser view
view enable 
enable view 
config view super view

2. (TCO 2) Which of the following commands is required before you can begin configuring SSH configuration on a Cisco router? (Points : 4)
crypto key generate rsa 
ip domain-name 
crypto key zeroize 
transport input ssh

3.  (TCO 2) The show running-config output can be modified using all of the following pipes, except _____. (Points : 4)
| begin 
end 
include 
exclud

1. (TCO 1) The agents used in a distributed denial of service attack are called _____. (Points : 4)
Zombies
Vampires
Werewolves
Smurfs

2. (TCO 1) When an attacker monitors traffic between a sender and receiver, this is called a(n) _____ attack. (Points : 4)
Active
Monitoring
packet capture
intrusion
man-in-the-middle

3. (TCO 1) How would you describe IP spoofing? (Points : 4)
Altering the source IP address in packets 
Sending large amounts of ICMP packets to a broadcast address
Altering IP routing tables
Packet sniffing

 

1. (TCO 1) The _____ attack method uses the target IP address as both a source and destination to confuse the destination host or router. (Points : 4)
Ping of Death
SYN flood
Smurf
land.c

2. (TCO 1) The component of network security that ensures that authorized users have access to data and network resources is _____. (Points : 4)
data integrity
data confidentiality
data and system availability
data and user authentication

3. (TCO 1) An external menace to a system or its design is called a(n) _____. (Points : 4)
Vulnerability
Threat
Risk
exploit

Assignmentsonline.org help students to solve their assignment in the best possible manner. In the assignment help industry, we are regarded as one of the best helpers for students’ tasks in all subjects. We provide solutions to students from all corners of the world, but the main focus is from students residing in the US, UK, and Australia. Our primary focus is solving student assignments for all subjects and streams.

Place Order NOw

Assignment online is a team of top-class experts whose only goal is to give you the best assignment help service. Follow the link below to order now...

#write essay #research paper