Exam 3: Network Security
Exam 1: Welcome to the Cloud95 Questions
Exam 2: Network Standards69 Questions
Exam 3: Network Security88 Questions
Exam 4: Network and Security Management64 Questions
Exam 5: Ethernet 8023switched Lans70 Questions
Exam 6: Wireless Lans I69 Questions
Exam 7: Wireless Lans 256 Questions
Exam 8: Tcp-Ip Internet Working I61 Questions
Exam 9: Tcp-Ip Internet Working 256 Questions
Exam 10: Carrier Wide Area Networks Wans74 Questions
Exam 11: Networked Applications62 Questions
Exam 12: Module a More on Tcp4 Questions
Exam 13: Module B More on Modulation12 Questions
Exam 14: Module C More on Telecommunications47 Questions
Exam 15: Module D Directory Servers11 Questions
Select questions type
Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
(Multiple Choice)
5.0/5
(37)
In authentication,the ________ is the party trying to prove his or her identity.
(Multiple Choice)
4.9/5
(37)
A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.
(Multiple Choice)
4.9/5
(33)
________ is the dominant firewall filtering method used on main border firewalls today.
(Multiple Choice)
4.7/5
(35)
Which type of firewall filtering collects streams of packets to analyze them as a group?
(Multiple Choice)
4.7/5
(28)
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.
(Multiple Choice)
4.9/5
(37)
You discover that you can get into other e-mail accounts after you have logged in under your account.You spend just a few minutes looking at another user's mail.Is that hacking?
(Multiple Choice)
4.9/5
(33)
A password-cracking attack that tries all combinations of keyboard characters is called a ________.
(Multiple Choice)
5.0/5
(29)
An attack aimed at a single person or a small group of individuals is a(n)________ attack.(Choose the most specific answer.)
(Multiple Choice)
4.9/5
(33)
Pieces of code that are executed after the virus or worm has spread are called ________.
(Multiple Choice)
4.8/5
(42)
________ is the general name for proofs of identity in authentication.
(Multiple Choice)
4.9/5
(32)
In distributed DoS attacks,the attacker sends messages directly to ________.
(Multiple Choice)
4.8/5
(32)
If you see a username and password on a Post-It note that anyone can see on a monitor,is it hacking if you use this information to log in?
(Multiple Choice)
4.9/5
(35)
Which of the following probably suffered the most financial damage from the Target breach?
(Multiple Choice)
4.9/5
(38)
Showing 41 - 60 of 88
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)