IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Security 1.0Refer to Chart 3. What is the plaintext value for the encrypted text FMVMXIBKGVW?ITExamAnswers asked 2 years ago • Network Security 1.0Refer to Chart 3. What is the encrypted value of the word INTEGRITY?ITExamAnswers asked 2 years ago • Network Security 1.0Refer to Chart 2. What is the encrypted text for the word AUTHENCITY?ITExamAnswers asked 2 years ago • Network Security 1.0Refer to Chart 1. What is the encrypted text for the term ENCRYPTION?ITExamAnswers asked 2 years ago • Network Security 1.0The receiver can verify that the received message is identical to the sent message and that no manipulation occurred.ITExamAnswers asked 2 years ago • Network Security 1.0A key is required to encrypt and decrypt a message.ITExamAnswers asked 2 years ago • Network Security 1.0Encryption and hashing are used to make certain that only authorized entities can read the message.ITExamAnswers asked 2 years ago • Network Security 1.0In banking, it can be achieved by requiring a secure personal identification number (PIN) at an ATM.ITExamAnswers asked 2 years ago • Network Security 1.0Guarantees that a message comes from the source that it claims to come from.ITExamAnswers asked 2 years ago • Network Security 1.0Ensures that messages are not altered in transit.ITExamAnswers asked 2 years ago • Network Security 1.0Ensures privacy so that only the receiver can read the message.ITExamAnswers asked 2 years ago • Network Security 1.0What prevents MAC and IP address spoofing attacks?ITExamAnswers asked 2 years ago • Network Security 1.0What prevents DHCP starvation and spoofing attacks?ITExamAnswers asked 2 years ago • Network Security 1.0What type of attack sends false address requests to a server until all addresses are used and none are available for legitimate users?ITExamAnswers asked 2 years ago • Network Security 1.0What prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks?ITExamAnswers asked 2 years ago • Network Security 1.0