Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
A. ARP
B. TCP
C. ICMP
D. IGMP
Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?
A. Broadcast storm
B. SYN attack
C. Spoofing
D. PING attack
Which of the following statements about Encapsulating Security Payload (ESP) are true? Each correct answer represents a complete solution. Choose two.
A. It can also be nested with the Layer Two Tunneling Protocol (L2TP).
B. It is an IPSec protocol.
C. It uses TCP port 22 as the default port and operates at the application layer.
D. It is a text-based communication protocol.
Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?
A. Mail bombing
B. Piggybacking
C. Spoofing
D. Snooping
Which of the following refers to a program that allows access to a system by skipping the security checks?
A. Honey pot
B. Hoax
C. Back door
D. Worm
How many keys are used to encrypt data in symmetric encryption?
A. Four
B. One
C. Two
D. Three
Which of the following is not a biometrics technology for authentication?
A. Fingerprint
B. Voiceprint
C. Facial geometry
D. User password
Which of the following protocols is used to establish a secure TELNET session over TCP/IP?
A. PGP
B. SSH
C. SSL
D. IPSEC
The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?
A. 15
B. 13
C. 10
D. 21
E. 18