Copyright Goodheart-Willcox Co., Inc. 493 Chapter 15 Network Security 5. Terri is reviewing password security for her company. She is concerned about password security. Which is the best example of a secure password? A. BigDog B. Star$Read1345 C. NtsysFive D. Pass123456789 6. Which security term is used to describe the act of trying to get information from a person through fraudulent means? A. Trojan B. Phishing C. Man in the middle D. DoS 7. Which is a centralized security method that uses a server for wireless authentication? A. WEP B. WAP C. WPA D. 802.1x 8. Mark is responsible for the wireless network at his company. He is training a new intern, and trying to explain all the various parts of the wireless network. Which of the following is used to identify a wireless network? A. MAC fi lter B. SSID C. EAP D. Subnet mask 9. Which is the most common means of spreading a computer worm? A. Uploading data from a disc B. Newly installed hardware devices C. Opening e-mail attachments D. Newly installed software utilities 10. Which protocol was designed to provide secure communication between a web server and a web browser? A. SSL B. FTP C. PPP D. RADIUS
Previous Page Next Page