Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Mobile code is another name for ________.

(Multiple Choice)
4.8/5
(35)

Which of the following is a propagation vector for some worms?

(Multiple Choice)
4.8/5
(38)

Electronic signatures provide message-by-message ________.

(Multiple Choice)
4.7/5
(37)

In symmetric key encryption,a key must be ________ bits long or longer to be considered strong.(Choose the choice closest to the correct answer.)

(Multiple Choice)
4.7/5
(36)

Which of the following is a criterion by which biometrics can be judged?

(Multiple Choice)
4.8/5
(34)

How will an SPI firewall handle a packet containing a TCP FIN segment?

(Multiple Choice)
4.9/5
(31)

The password Velociraptor is adequately strong.

(True/False)
4.7/5
(37)

Malware programs that masquerade as system files are called ________.

(Multiple Choice)
4.9/5
(35)

Hackers identify possible victim computers by sending ________.

(Multiple Choice)
4.8/5
(46)

Stateful firewalls are attractive because of their ________.

(Multiple Choice)
4.9/5
(33)

After a break-in,the first step usually is to ________.

(Multiple Choice)
4.8/5
(39)

Trojan horses can get onto computers by ________.

(Multiple Choice)
4.9/5
(40)

A password that can be defeated by a hybrid dictionary attack can be adequately long if it ________.

(Multiple Choice)
4.9/5
(41)

The password Velociraptor can be defeated most quickly by a ________.

(Multiple Choice)
4.8/5
(37)

Cyberwar attacks are made by national governments or organized terrorists.

(True/False)
4.8/5
(40)

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.

(Multiple Choice)
4.9/5
(43)

Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.

(Multiple Choice)
4.8/5
(31)

Identity theft is stealing credit card numbers,in order to make unauthorized purchases.

(True/False)
4.8/5
(36)

Which of the following can spread more rapidly?

(Multiple Choice)
4.7/5
(38)

Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 152
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)