SEOTrance
SiteMap
Website Deployment
Website Design
Website Models
Web Development
Web Technologies
Search Engines
Safeguard Network
«Prev
Next»
Web Technologies
Accessing Internet
Internet Connection
HW/SW Access
Configure MAC
Configuring Windows Internet
Configure Hosts File
DHCP Static IP
Configuring Browser Performance
Browsers, Cookies, Activex
Email Rx, Tx
Common Mime Types
Mime File Examples
Internet Summary
Infrastructure Framework
OSI Network Model
Internet Infrastructure
Backbones Network
Network Hardware SW
Different Server Types
Additional Server Functions
Internet Bandwidth Technologies
Internet Bandwidth Protocols
Data Transfer Speed
Server Transfer Load
Network Diagnostic Tools
Network Analyzers
Configuration Problems
Internet Foundation Conclusion
Network Devices - Quiz
Internet Protocols
Nature Purpose Protocols
TCP/IP Protocol
TCP/IP Address Classifications
Purpose Subnet Masks
Remote Protocols
Point2Point VPN
Emai Name Protocols
Web Protocols
DNS
DNS Structure
URL
Operational Protocols
Internet Technologies
HTTP Error Codes
FTP
Command Line Transfer
What is Telnet
Email Directories
Group Communication
Additional Web Technologies
Search Engines
Wild Card Searches
Communication Services
Safeguard Network
Detect Security Breaches
Web Conclusion
Access Control Encryption - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
Which two access control methods would you likely use to protect an intranet?
Please select all the correct answers.
A.
Packet filter
B.
Firewall
C.
Digital signature
D.
Encryption
2.
Which security device should you use to decrypt a message sent to you using private key encryption?
Please select the best answer.
A.
SET
B.
Public key
C.
Private key
D.
Digital signature
3.
Which encryption method would you need to use to communicate with a relative in India?
Please select the best answer.
A.
56-bit encrypted browser
B.
128-bit encrypted browser
C.
40-bit encrypted browser
D.
40-bit or 128-bit encrypted browser