Chapter 4: Network Security Exam Questions with 100% Correct Answers
Chapter 4: Network Security Exam Questions with 100% Correct Answers Application programming interface (API) - Answer ️️ -A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool. Bit - Answer ️️ -The most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model. Broadcast - Answer ️️ -Broadcast transmission is a one-to-many (one-to-everyone) form of sending internet traffic. Byte - Answer ️️ -The byte is a unit of digital information that most commonly consists of eight bits. Cloud computing - Answer ️️ -A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST 800-145 Community cloud - Answer ️️ -A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises. NIST 800-145 De-encapsulation - Answer ️️ -The opposite process of encapsulation, in which bundles of data are unpacked or revealed. Denial-of-Service (DoS) - Answer ️️ -The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) Source: NIST SP 800-27 Rev A Domain Name Service (DNS) - Answer ️️ -This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol. Encapsulation - Answer ️️ -Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; its opposite process may be called unpacking, revealing, or using other terms. Also used to refer to taking any set of data and packaging it or hiding it in another data structure, as is common in network protocols and encryption. Encryption - Answer ️️ -The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two terms are sometimes used interchangeably in literature and have similar meanings. File Transfer Protocol (FTP) - Answer ️️ -The internet protocol (and program) used to transfer files between ho
Written for
- Institution
- Security Principles
- Course
- Security Principles
Document information
- Uploaded on
- January 25, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
chapter 4 network security exam questions with 10