Exam 16: Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The purpose of denial-of-service attacks is to gain information or steal resources.

(True/False)
4.9/5
(36)

Address Space Layout Randomization (ASLR) technique protects an operating system against_______________

(Multiple Choice)
4.8/5
(30)

IPSec uses ______ encryption.

(Multiple Choice)
4.8/5
(39)

Using a firewall, the following connection is allowed:

(Multiple Choice)
4.9/5
(36)

IPSs (Intrusion Prevention Systems) can detect zero-day attack if they employ_____________

(Multiple Choice)
4.8/5
(41)

Describe the idea of main-in-the-Medium attack.

(Essay)
4.9/5
(33)

A virus is a fragment of code embedded in a malware.

(True/False)
4.9/5
(41)

________ is a type of social-engineering attack, in which a legitimate-looking e-mail misleads a user into entering confidential information.

(Multiple Choice)
4.9/5
(32)

Describe the principle of least privilege.

(Essay)
4.9/5
(32)

Why UNIX does not suffer from viruses?

(Essay)
5.0/5
(35)

Trojan mule is a type of the Trojan horse which emulates ____________

(Multiple Choice)
4.7/5
(33)

How does one distribute a key for symmetric algorithms?

(Essay)
4.9/5
(32)
Showing 21 - 32 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)