ITSY 1300 exam 2
Study online at https://quizlet.com/_379k6y
1. What type of trust model has a single CA that acts as a bridge trust
facilitator to interconnect all other CAs?
2. What technology enables authorized users to use an VPN
unsecured public network, such as the Internet, as if
were a secure private network?
3. What transport protocol is used by Windows operating NetBIOS
systems to allow applications on separate computers
to communicate over a LAN?
4. When two individuals trust each other because of the third-party
trust that exists between the individuals and a sepa-
rate entity, what type of trust has been established?
5. What protocol suite below is the most commonly used TCP/IP
protocol for local area network (LAN) communication?
6. What kind of certificate is typically used by an individ- Personal digital
ual to secure e-mail transmissions?
7. Which encryption protocol below is used in the WPA2 AES-CCMP
standard?
8. What type of monitoring compares network traffic, Signature
activities, transactions, or behavior against a database
of known attack patterns?
9. Simply using a mobile device in a public area can be true
considered a risk.
10. Select below the term that is used to describe a trusted Certification Authority
third-party agency that is responsible for issuing digi-
tal certificates:
1/9
, ITSY 1300 exam 2
Study online at https://quizlet.com/_379k6y
11. A sensitive connection between a client and a web Class 2
server uses what class of certificate?
12. Digital signatures actually only show that the public true
key labeled as belonging to the person was used to
encrypt the digital signature.
13. What is the name for an instruction that interrupts a system call
program being executed and requests a service from
the operating system?
14. What term below is used to describe an attack that Bluejacking
sends unsolicited messages to Bluetooth enabled de-
vices?
15. At what stage can a certificate no longer be used for expiration
any type of authentication?
16. What protocol below supports two encryption modes: IPSec
transport and tunnel?
17. A Bluetooth attack in which the attacker accesses Bluesnarfing
unauthorized information from a wireless device using
a Bluetooth connection, is known as?
18. Which EAP protocol creates an encrypted channel be- PEAP
tween the client authentication server and the client,
and uses Microsoft Windows logins and passwords?
19. Bluetooth is an example of what type of technology Personal Area Network
below?
20. Registration Authority
2/9
Study online at https://quizlet.com/_379k6y
1. What type of trust model has a single CA that acts as a bridge trust
facilitator to interconnect all other CAs?
2. What technology enables authorized users to use an VPN
unsecured public network, such as the Internet, as if
were a secure private network?
3. What transport protocol is used by Windows operating NetBIOS
systems to allow applications on separate computers
to communicate over a LAN?
4. When two individuals trust each other because of the third-party
trust that exists between the individuals and a sepa-
rate entity, what type of trust has been established?
5. What protocol suite below is the most commonly used TCP/IP
protocol for local area network (LAN) communication?
6. What kind of certificate is typically used by an individ- Personal digital
ual to secure e-mail transmissions?
7. Which encryption protocol below is used in the WPA2 AES-CCMP
standard?
8. What type of monitoring compares network traffic, Signature
activities, transactions, or behavior against a database
of known attack patterns?
9. Simply using a mobile device in a public area can be true
considered a risk.
10. Select below the term that is used to describe a trusted Certification Authority
third-party agency that is responsible for issuing digi-
tal certificates:
1/9
, ITSY 1300 exam 2
Study online at https://quizlet.com/_379k6y
11. A sensitive connection between a client and a web Class 2
server uses what class of certificate?
12. Digital signatures actually only show that the public true
key labeled as belonging to the person was used to
encrypt the digital signature.
13. What is the name for an instruction that interrupts a system call
program being executed and requests a service from
the operating system?
14. What term below is used to describe an attack that Bluejacking
sends unsolicited messages to Bluetooth enabled de-
vices?
15. At what stage can a certificate no longer be used for expiration
any type of authentication?
16. What protocol below supports two encryption modes: IPSec
transport and tunnel?
17. A Bluetooth attack in which the attacker accesses Bluesnarfing
unauthorized information from a wireless device using
a Bluetooth connection, is known as?
18. Which EAP protocol creates an encrypted channel be- PEAP
tween the client authentication server and the client,
and uses Microsoft Windows logins and passwords?
19. Bluetooth is an example of what type of technology Personal Area Network
below?
20. Registration Authority
2/9