Exam 1: Cybersecurity and Network Protocols

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

D

What port does Telnet use?

Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
Verified

D

Why would a hacker use a proxy server?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

Pretty good privacy (PGP) is used in ______

(Multiple Choice)
4.8/5
(40)

What is Firewall?

(Multiple Choice)
4.8/5
(25)

The domain name space (tree) is devided into---------different sections

(Multiple Choice)
4.8/5
(33)

The _____domains define registered hosts according to their generic behaviour.

(Multiple Choice)
4.9/5
(39)

An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL

(Multiple Choice)
4.9/5
(31)

The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

(Multiple Choice)
4.8/5
(39)

A ___________ is an extension of an enterprise's private intranet across a public network such as the internet, creating a secure private connection.

(Multiple Choice)
4.9/5
(41)

IPSec is designed to provide security at the _________

(Multiple Choice)
4.8/5
(37)

A digital signature needs a

(Multiple Choice)
4.8/5
(30)

Which component is included in IP security?

(Multiple Choice)
4.8/5
(40)

What is the most important activity in system hacking?

(Multiple Choice)
4.9/5
(33)

In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

(Multiple Choice)
4.9/5
(30)

For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm's principal and the principal's associated "secret keys".

(Multiple Choice)
4.8/5
(36)

What are the two primary classifications of cross-site scripting?

(Multiple Choice)
4.9/5
(30)

What is necessary for a cross-site script attack with cookies to be thwarted

(Multiple Choice)
4.9/5
(39)

For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

(Multiple Choice)
4.7/5
(39)

______uses the idea of certificate trust levels

(Multiple Choice)
4.7/5
(29)
Showing 1 - 20 of 23
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)