Filters
Question type

Study Flashcards

Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.


A) authentication
B) confidentiality
C) both A and B
D) neither A nor B

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Malware programs that masquerade as system files are called ________.


A) viruses
B) scripts
C) payloads
D) Trojan horses

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Trojan horses can get onto computers by ________.


A) viruses
B) hackers
C) both A and B
D) neither A nor B

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Cyberwar attacks are made by national governments or organized terrorists.

A) True
B) False

Correct Answer

verifed

verified

In symmetric key encryption,a key must be ________ bits long or longer to be considered strong.(Choose the choice closest to the correct answer.)


A) 40
B) 56
C) 128
D) 1,024

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Stateful firewalls are attractive because of their ________.


A) high filtering sophistication
B) ability to filter complex application content
C) QoS guarantees
D) low cost

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A password that can be defeated by a hybrid dictionary attack can be adequately long if it ________.


A) can only be broken by a brute force-attack
B) is sufficiently long
C) begins with a capital letter and ends with a digit (number)
D) none of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The password Velociraptor is adequately strong.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a criterion by which biometrics can be judged?


A) cost
B) susceptibility to deception
C) both A and B
D) neither A nor B

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

After a break-in,the first step usually is to ________.


A) do damage manually
B) delete log files
C) create a backdoor
D) download a hacker toolkit

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Electronic signatures provide message-by-message ________.


A) authentication
B) confidentiality
C) both A and B
D) neither A nor B

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Identity theft is stealing credit card numbers,in order to make unauthorized purchases.

A) True
B) False

Correct Answer

verifed

verified

How will an SPI firewall handle a packet containing a TCP FIN segment?


A) process it through the ACL
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a propagation vector for some worms?


A) e-mail
B) direct propagation
C) both A and B
D) neither A nor B

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Hackers identify possible victim computers by sending ________.


A) scouts
B) probe packets
C) exploits
D) Mocking Jays

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following can spread more rapidly?


A) directly-propagating viruses
B) directly-propagating worms
C) Both of the above can spread with approximately equal speed.

D) A) and C)
E) All of the above

Correct Answer

verifed

verified

Mobile code is another name for ________.


A) virus
B) worm
C) both A and B
D) neither A nor B

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.


A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
D) passes the packet, but notifies an administrator

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.


A) have comprehensive security
B) have defense in depth
C) do risk analysis
D) only give minimum permissions

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

The password Velociraptor can be defeated most quickly by a ________.


A) dictionary attack
B) hybrid mode dictionary attack
C) brute force attack
D) All of the above could defeat the password equally quickly.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 152

Related Exams

Show Answer