Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SEC401. || 100% Correct Answers.

Beoordeling
-
Verkocht
-
Pagina's
197
Cijfer
A+
Geüpload op
15-04-2026
Geschreven in
2025/2026

SEC401. || 100% Correct Answers.

Instelling
SEC401.
Vak
SEC401.

Voorbeeld van de inhoud

SEC401. || 100% Correct Answers.


3DES correct answers (Triple Data Encryption Standard) A symmetric encryption algorithm that
encrypts data by processing each block of data three times, using a different DES key each time.


802.11 correct answers A family of specifications developed by the IEEE for wireless LAN
technology.


802.11a correct answers A fast, secure, but relatively expensive protocol for wireless
communication. It Supports speeds up to 54 Mbps in the 5 GHz frequency.


802.11ac correct answers A wireless communication protocol that improves upon 802.11n by
adding wider channels to increase bandwidth.


802.11b. correct answers The first specification to be called Wi-Fi, it is the least expensive
wireless network protocol used to transfer data among computers with wireless network cards, or
between a wireless computer or device and a wired LAN. It provides for an 11 Mbps transfer rate
in the 2.4 GHz frequency.


802.11g correct answers A specification for wireless data throughput at the rate of up to 54 Mbps
in the 2.4 GHz band that is a potential replacement for 802.11b


802.11n correct answers A wireless standard for home and business implementations that adds
QoS features and multimedia support to 802.11a and 802.11b.


802.1x correct answers An IEEE standard used to provide a port based authentication mechanism
over a LAN or WLAN


access control correct answers In IT security terms, the process of determining and assigning
privileges to various resources, objects, and data.

,Access Control Lists (ACL) correct answers In a DAC (discretionary access control) access
control scheme, this is the list that is associated with each object, specifying the subjects that can
access the object and their levels of access.


account federation correct answers The practice of linking a single account across many different
management systems.


account management correct answers A common term used to refer to the processes, functions,
and policies used to effectively manage user accounts within an organization.


account phishing correct answers In social networking, and attack where an attacker creates an
account and gets on the friends list of an individual just to try to obtain information about the
individual and their circle of friends or colleagues.


account policy correct answers A document that includes an organization's user account
management guidelines.


account privileges correct answers Permissions granted to users that allow them to perform
various actions such as creating, deleting, and editing files, and also accessing systems and
services on the network.


accountability correct answers In security terms, the process of determining who to hold
responsible for a particular activity or event.


accounting correct answers In IT security terms, the process of tracking and recording system
activities and resource access.


Active Directory correct answers The standards-based directory service from Microsoft that runs
on Microsoft Windows servers.

,adware correct answers Software that automatically displays or downloads advertisements when
it is used.


AES (Advanced Encryption Standard) correct answers A symmetric 128-, 192-, or 256-bit block
cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and
Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.


ALE (annual loss expectancy) correct answers The total cost of a risk to an organization on an
annual basis.


all-in-one-security appliance correct answers A single network device that is used to perform a
number of security functions to secure a network.


anomaly-based monitoring correct answers A monitoring system that uses a database of
unacceptable traffic patterns identified by analyzing traffic flows.


anti-malware software correct answers A category of software programs that scan a computer or
network for known viruses, Trojans, worms, and other malicious software.


anti-spam correct answers A program that will detect specific words that are commonly used in
spam messages.


anti-spyware correct answers Software that is specifically designed to protect systems against
spyware attacks.


antivirus software correct answers An application that scans files for executable code that
matches specific patterns that are known to be common to viruses.


API (application programming interface) correct answers A mechanism that defines how
software elements interact with each other.

, application attacks correct answers Attacks that are targeted at web-based and other client-server
applications.


application aware device correct answers A network device that manages information about any
application that connects to it.


application blacklisting correct answers The practice of preventing undesirable programs from
running on a computer, computer network, or mobile device.


application whitelisting correct answers The practice of allowing approved programs to run on a
computer, computer network, or mobile device.


arbitrary code execution correct answers An attack that exploits an applications vulnerability into
allowing the attacker to execute commands on a user's computer.


archive bit correct answers A file property that essentially indicates whether the file has been
modified since the last back up.


armored virus correct answers A virus that is able to conceal its location or otherwise render
itself harder to detect by anti-malware programs.


ARO (annual rate of occurrence) correct answers How many times per year a particular loss is
expected to occur.


ARP (Address Resolution Protocol) correct answers The mechanism by which individual
hardware MAC addresses are matched to an IP address on a network.


ARP poisoning correct answers A method in which an attacker, with access to the target network,
redirects an IP address to the MAC address of a computer that is not the intended recipient.

Geschreven voor

Instelling
SEC401.
Vak
SEC401.

Documentinformatie

Geüpload op
15 april 2026
Aantal pagina's
197
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$28.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
778
Lid sinds
3 jaar
Aantal volgers
438
Documenten
38563
Laatst verkocht
2 dagen geleden
Reign Supreme Scholarly || Enlightened.

Get your revised study materials available here and elevate your educational outcomes. I have numerous verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. I am dedicated to offering you the best and unique learning content. You are encouraged to inquire further assistance from this end whenever need be. Kindly remember to leave your review, understanding your satisfaction is essential . We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lees meer Lees minder
3.7

116 beoordelingen

5
49
4
20
3
23
2
8
1
16

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen