Exam 1: Cybersecurity and Technology
Exam 1: Cybersecurity and Technology25 Questions
Exam 2: Cybersecurity and Cryptography21 Questions
Select questions type
___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
C
Which of the following is true of improper error handling?
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
D
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
Which of the following is NOT recommended for securing Web applications against authenticated users?
(Multiple Choice)
4.8/5
(26)
__________ is an electronic or paper log used to track computer activity.
(Multiple Choice)
4.9/5
(23)
This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
(Multiple Choice)
4.8/5
(42)
This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.
(Multiple Choice)
4.9/5
(36)
In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?
(Multiple Choice)
4.9/5
(42)
This technology is used to measure and analyze human body characteristics for authentication purposes.
(Multiple Choice)
4.8/5
(33)
This is a mechanism for ensuring that only authorized users can copy or use specific software applications.
(Multiple Choice)
4.8/5
(29)
This is an encryption/decryption key known only to the party or parties that exchange secret messages.
(Multiple Choice)
4.7/5
(45)
This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
(Multiple Choice)
4.8/5
(28)
This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.
(Multiple Choice)
4.8/5
(31)
This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites.
(Multiple Choice)
4.8/5
(41)
At which two traffic layers do most commercial IDSes generate signatures?
(Multiple Choice)
4.9/5
(29)
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
(Multiple Choice)
4.9/5
(42)
"Semantics-aware" signatures automatically generated by Nemean are based on traffic at which two layers?
(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)