Exam 1: Cybersecurity and Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

C

Which of the following is true of improper error handling?

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

D

In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

Which of the following is NOT recommended for securing Web applications against authenticated users?

(Multiple Choice)
4.8/5
(26)

__________ is an electronic or paper log used to track computer activity.

(Multiple Choice)
4.9/5
(23)

This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

(Multiple Choice)
4.8/5
(42)

This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.

(Multiple Choice)
4.9/5
(36)

A false positive can be defined as…

(Multiple Choice)
4.8/5
(37)

In which of the following exploits does an attacker add SQL code to a Web form input box to gain access to resources or make changes to data?

(Multiple Choice)
4.9/5
(42)

This technology is used to measure and analyze human body characteristics for authentication purposes.

(Multiple Choice)
4.8/5
(33)

What is the purpose of a shadow honeypot?

(Multiple Choice)
4.8/5
(38)

Which of the following is characteristic of spyware?

(Multiple Choice)
4.7/5
(31)

This is a mechanism for ensuring that only authorized users can copy or use specific software applications.

(Multiple Choice)
4.8/5
(29)

This is an encryption/decryption key known only to the party or parties that exchange secret messages.

(Multiple Choice)
4.7/5
(45)

This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.

(Multiple Choice)
4.8/5
(28)

This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.

(Multiple Choice)
4.8/5
(31)

This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites.

(Multiple Choice)
4.8/5
(41)

At which two traffic layers do most commercial IDSes generate signatures?

(Multiple Choice)
4.9/5
(29)

An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?

(Multiple Choice)
4.9/5
(42)

"Semantics-aware" signatures automatically generated by Nemean are based on traffic at which two layers?

(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)