Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP segment which is an acknowledgement?

(Multiple Choice)
4.8/5
(37)

In antivirus filtering,the best ways to filter currently use ________.

(Multiple Choice)
4.9/5
(34)

SSL/TLS is used for ________.

(Multiple Choice)
4.8/5
(38)

Tricking users into doing something against their security interests is ________.

(Multiple Choice)
4.9/5
(39)

An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)

(Multiple Choice)
4.9/5
(41)

Which of the following attach themselves to other programs?

(Multiple Choice)
4.8/5
(48)

Which of the following sometimes uses direct propagation between computers?

(Multiple Choice)
4.7/5
(33)

To defeat brute-force attacks,a password must be ________.

(Multiple Choice)
4.8/5
(40)

The Target attackers probably first broke into Target using the credentials of a(n)________.

(Multiple Choice)
4.7/5
(37)

________ are full programs.

(Multiple Choice)
4.9/5
(41)

Credit card number thieves are called ________.(Pick the most precise answer.)

(Multiple Choice)
4.8/5
(34)

Prepare2 can be cracked most quickly by a(n)________.

(Multiple Choice)
4.9/5
(43)

Which of the following meets the definition of hacking ________.

(Multiple Choice)
4.8/5
(38)

In two-way dialogues using symmetric key encryption,how many keys are used for encryption and decryption?

(Multiple Choice)
4.9/5
(42)

Attack programs that can be remotely controlled by an attacker are ________.

(Multiple Choice)
4.7/5
(36)

How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP SYN segment?

(Multiple Choice)
4.8/5
(32)

In digital certificate authentication,the verifier uses ________.

(Multiple Choice)
4.8/5
(42)

ACLs are used for packets in the ________ state.

(Multiple Choice)
4.7/5
(37)

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.

(Multiple Choice)
4.8/5
(42)

Debit card is secure because it requires two credentials for authentication.This is also called ________.

(Multiple Choice)
4.8/5
(44)
Showing 21 - 40 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)