Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the most dangerous types of employees?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

A program that can capture passwords as you enter them is ________.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

A

The password R7%t& is adequately strong.

Free
(True/False)
4.7/5
(45)
Correct Answer:
Verified

False

A password that can be broken by a dictionary attack or a dictionary attack in hybrid mode can be adequately strong if it is very long.

(True/False)
4.8/5
(41)

Which of the following sometimes uses direct propagation between computers?

(Multiple Choice)
4.8/5
(37)

The generic name for evil software is ________.

(Multiple Choice)
4.9/5
(35)

Electronic signatures provide message-by-message ________.

(Multiple Choice)
4.7/5
(30)

Access control involves ________.

(Multiple Choice)
4.9/5
(38)

Unsolicited commercial e-mail is better known as ________.

(Multiple Choice)
4.9/5
(42)

According to the book,passwords should be at least ________ characters long.

(Multiple Choice)
4.8/5
(31)

Firewalls typically stop viruses.

(True/False)
4.9/5
(40)

To defeat brute-force attacks,a password must be ________.

(Multiple Choice)
4.8/5
(41)

What does a hacker usually do IMMEDIATELY after downloading a hacker toolkit?

(Multiple Choice)
4.8/5
(45)

The password 7u3aB& can be defeated most quickly by a ________.

(Multiple Choice)
4.9/5
(39)

ASIC technology has been critical to the development of ________.

(Multiple Choice)
4.9/5
(27)

Two-factor authentication usually will work even if the attacker can intercept all authentication communication.

(True/False)
4.7/5
(39)

Two-factor authentication usually will work even if the attacker controls the supplicant's computer.

(True/False)
4.8/5
(40)

Policies are separated by implementation to take advantage of ________.

(Multiple Choice)
4.8/5
(36)

The generic name for a security flaw in a program is a ________.

(Multiple Choice)
4.7/5
(30)

Methods that hackers use to break into computers are ________.

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 152
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)