Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Attackers only need to find a single weakness to break in.Consequently,companies must ________.

(Multiple Choice)
4.7/5
(34)

A way back into a system that an attacker can use to get into the compromised computer later is called a ________.(Choose the most specific answer.)

(Multiple Choice)
4.7/5
(36)

What type of attacker are most attackers today?

(Multiple Choice)
4.8/5
(37)

Which of the following is not one of the four response phases for when attacks occur?

(Multiple Choice)
4.9/5
(44)

Security is primarily a management issue.

(True/False)
4.7/5
(47)

The last stage in a hacking attack is ________.

(Multiple Choice)
4.8/5
(36)

Viruses propagate within a computer by infecting other programs in that computer.

(True/False)
4.8/5
(31)

Requiring someone requesting to use a resource to prove his or her identity is ________.

(Multiple Choice)
4.8/5
(36)

Compromises also are called ________.

(Multiple Choice)
4.9/5
(35)

The password 7u3aB& is adequately strong.

(True/False)
4.7/5
(35)

It is generally illegal to write malware.

(True/False)
4.9/5
(45)

Which of the following can be a type of backdoor?

(Multiple Choice)
4.9/5
(41)

With complex passwords,adding a single character increases the number of passwords that must be tried in brute force guessing by a factor of about ________.

(Multiple Choice)
4.8/5
(33)

In general,authenticated users should be given maximum permissions in a resource so that they can do their jobs with few restrictions.

(True/False)
4.8/5
(37)

Which type of firewall filtering collects streams of packets to analyze them as a group?

(Multiple Choice)
4.8/5
(45)

Scripts normally are bad.

(True/False)
4.9/5
(40)

What type of attacker can do the most damage?

(Multiple Choice)
4.9/5
(41)

Universal malware requires a vulnerability to succeed.

(True/False)
4.7/5
(30)

The password R7%t& can be defeated by a ________.

(Multiple Choice)
4.9/5
(38)

Scripts are likely to be dangerous primarily if a computer has a vulnerability.

(True/False)
4.7/5
(25)
Showing 101 - 120 of 152
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)