Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The general name for evil software is ________.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

Electronic signatures also provide ________ in addition to authentication.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

A

Which of the following tends to be more damaging to the victim?

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

B

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.(Read this question carefully.)

(Multiple Choice)
4.8/5
(37)

The Target attackers sold their stolen card information to ________.

(Multiple Choice)
4.8/5
(32)

Passwords are widely used because they ________.

(Multiple Choice)
4.9/5
(37)

What type of attacker can do the most damage?

(Multiple Choice)
4.7/5
(28)

Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.

(Multiple Choice)
4.9/5
(33)

In digital certificate authentication,the verifier gets the key it needs directly from the ________.

(Multiple Choice)
4.9/5
(39)

Trojan horses can spread by ________.

(Multiple Choice)
4.9/5
(28)

Stateful firewalls are attractive because of their ________.

(Multiple Choice)
4.9/5
(31)

Iris scanning is attractive because of its ________.

(Multiple Choice)
4.8/5
(36)

NGFWs ________.

(Multiple Choice)
4.9/5
(36)

In digital certificate authentication,the supplicant encrypts the challenge message with ________.

(Multiple Choice)
4.8/5
(42)

In a firewall,VPN traversal ________.

(Multiple Choice)
4.7/5
(41)

Authentication should generally be ________.

(Multiple Choice)
4.8/5
(27)

A user picks the password "tiger." This is likely to be cracked quickly by a(n)________.

(Multiple Choice)
4.9/5
(34)

What type of attacker are most of attackers today?

(Multiple Choice)
5.0/5
(43)

The general name for a security flaw in a program is a ________.

(Multiple Choice)
4.8/5
(39)

Viruses most commonly spread from one computer to another ________.

(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)