1.
What term refers to a set of programs used to access and gain admin access to a system?
Correct Answer
C. Rootkit
Explanation
A rootkit is a set of programs that are designed to gain unauthorized access and administrative control over a computer system. It allows attackers to hide their presence and activities on the system, making it difficult for users or security tools to detect their malicious actions. Rootkits are commonly used by hackers to gain control over a system and carry out various malicious activities, such as stealing sensitive information, modifying system settings, or launching further attacks.
2.
In order to enhance security, TKIP encryption periodically changes what?
Correct Answer
A. The Encryption Key
Explanation
TKIP encryption periodically changes the Encryption Key. This is done to enhance security by preventing unauthorized access to the network. By regularly changing the Encryption Key, it becomes more difficult for potential attackers to decipher the encrypted data and gain unauthorized access to the network. This helps to protect the confidentiality and integrity of the transmitted data.
3.
A May, 2009 release of a new version of which Google browser promised faster access?
Correct Answer
A. Chrome
Explanation
The correct answer is "Chrome." In May 2009, Google released a new version of their browser, Chrome, which promised faster access.
4.
In VoIP, what term refers to the loss of speech-signal components, typically parts of words?
Correct Answer
D. Clipping
Explanation
Clipping is the term in VoIP that refers to the loss of speech-signal components, typically parts of words. This can occur when the signal level exceeds the maximum limit of the system, causing distortion and truncation of the audio waveform. It results in the speaker's voice sounding cut off or distorted, making it difficult to understand the speech.
5.
What term refers to usually-public places for people to get wireless access to the Internet?
Correct Answer
C. Hotspot
Explanation
A hotspot refers to usually-public places where people can access the Internet wirelessly. It is a location that provides Wi-Fi connectivity to users, allowing them to connect their devices and access the Internet. Hotspots are commonly found in cafes, airports, hotels, and other public areas where people may need to connect to the Internet while on the go.
6.
What term applies to the designation of traffic type for a connection, such as HTTP's 80?
Correct Answer
D. Port
Explanation
The term that applies to the designation of traffic type for a connection, such as HTTP's 80, is "Port". In computer networking, a port is a communication endpoint that is used to identify specific processes or services on a networked device. Ports are assigned specific numbers, and each number is associated with a particular protocol or service. In this case, HTTP typically uses port number 80 to establish a connection.
7.
2009 saw the release of what new smartphone from Palm?
Correct Answer
A. Pre
Explanation
In 2009, Palm released a new smartphone called the Pre.
8.
When referred to in computer networking, what is "WLAN"?
Correct Answer
C. Wireless Local Area Network
Explanation
WLAN stands for Wireless Local Area Network. It is a type of computer network that allows devices to connect and communicate wirelessly within a limited area, such as a home, office, or campus. This technology uses radio waves to transmit data between devices, eliminating the need for physical cables. WLANs provide flexibility and convenience for users, as they can access the network and internet from anywhere within the coverage area.
9.
What network feature is used to make emergency calls over VoIP?
Correct Answer
C. Enhanced 911
Explanation
Enhanced 911 is the correct answer because it is a network feature that allows emergency calls to be made over VoIP (Voice over Internet Protocol). Enhanced 911 provides the ability to automatically transmit the caller's location information to emergency services, enabling them to quickly respond to the emergency. This feature is crucial in ensuring that emergency calls made over VoIP are properly routed and responded to in a timely manner.
10.
What term, borrowed from warfare, describes a partially secure network outside a firewall?
Correct Answer
A. DMZ
Explanation
A DMZ, which stands for Demilitarized Zone, is a term borrowed from warfare that describes a partially secure network outside a firewall. In computer networking, a DMZ is a separate network segment that is used to host publicly accessible servers, such as web servers, while keeping them isolated from the internal network. This allows for an additional layer of security by placing a buffer zone between the internet and the internal network, reducing the risk of unauthorized access to sensitive information.
11.
What kind of packet filtering considers delivery conditions and context?
Correct Answer
A. Stateful
Explanation
Stateful packet filtering considers delivery conditions and context. It examines the state of a connection by keeping track of the packets sent and received. This allows it to make more informed decisions about whether to allow or block packets based on the current state of the connection. Stateful packet filtering is able to take into account factors such as the source and destination IP addresses, ports, and the sequence and acknowledgment numbers of packets.
12.
The RSA cryptography algorithm was invented by Ron Rivest, Adi Shamir and who else?
Correct Answer
C. Leonard Adleman
Explanation
The correct answer is Leonard Adleman. He, along with Ron Rivest and Adi Shamir, invented the RSA cryptography algorithm.
13.
Which three-key cryptographic algorithm is used by the U.S. to encrypt non-classified data?
Correct Answer
A. Triple-DES
Explanation
Triple-DES is the correct answer because it is a three-key cryptographic algorithm that is commonly used by the U.S. to encrypt non-classified data. This algorithm applies the Data Encryption Standard (DES) algorithm three times to each data block, making it more secure than the original DES algorithm. Triple-DES provides a higher level of encryption and is widely adopted for securing sensitive information in various industries.
14.
In network security, what does the abbreviation "SSL" stand for?
Correct Answer
C. Secure Sockets Layer
Explanation
SSL stands for Secure Sockets Layer. It is a cryptographic protocol that provides secure communication over a computer network. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted or tampered with by unauthorized parties. It is commonly used to secure online transactions, such as credit card payments, and to protect sensitive information, such as login credentials. SSL has been widely replaced by Transport Layer Security (TLS), but the term SSL is still commonly used to refer to the newer protocol versions as well.
15.
What type of message has a hidden message encoded within the obvious external message?
Correct Answer
A. SteganograpHic
Explanation
Steganographic messages have a hidden message encoded within the obvious external message. Steganography is the practice of concealing information within another form of data, such as an image or audio file. The hidden message is typically only accessible to those who know the method of extraction or decryption. This technique is often used for covert communication or to protect sensitive information. Algebraic, trigonometric, and Orwellian do not involve the concealment of hidden messages within an external message.