Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Vulnerability-based attacks that occur before a patch is available are called ________ attacks.

(Multiple Choice)
5.0/5
(37)

In authentication,the ________ is the party trying to prove his or her identity.

(Multiple Choice)
4.9/5
(37)

Which of the following can spread more rapidly?

(Multiple Choice)
4.7/5
(27)

A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.

(Multiple Choice)
4.9/5
(33)

________ is the dominant firewall filtering method used on main border firewalls today.

(Multiple Choice)
4.7/5
(35)

The password "R7%t&" can be defeated by a ________.

(Multiple Choice)
4.7/5
(38)

The messages of VPNs ________.

(Multiple Choice)
4.8/5
(33)

Which type of firewall filtering collects streams of packets to analyze them as a group?

(Multiple Choice)
4.7/5
(28)

The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

(Multiple Choice)
4.9/5
(37)

Mobile code is another name for ________.

(Multiple Choice)
4.9/5
(37)

Firewall log files should be read ________.

(Multiple Choice)
4.9/5
(42)

You discover that you can get into other e-mail accounts after you have logged in under your account.You spend just a few minutes looking at another user's mail.Is that hacking?

(Multiple Choice)
4.9/5
(33)

A password-cracking attack that tries all combinations of keyboard characters is called a ________.

(Multiple Choice)
5.0/5
(29)

An attack aimed at a single person or a small group of individuals is a(n)________ attack.(Choose the most specific answer.)

(Multiple Choice)
4.9/5
(33)

Pieces of code that are executed after the virus or worm has spread are called ________.

(Multiple Choice)
4.8/5
(42)

________ is the general name for proofs of identity in authentication.

(Multiple Choice)
4.9/5
(32)

In distributed DoS attacks,the attacker sends messages directly to ________.

(Multiple Choice)
4.8/5
(32)

The password "NeVEr" can be defeated by a ________.

(Multiple Choice)
4.9/5
(39)

If you see a username and password on a Post-It note that anyone can see on a monitor,is it hacking if you use this information to log in?

(Multiple Choice)
4.9/5
(35)

Which of the following probably suffered the most financial damage from the Target breach?

(Multiple Choice)
4.9/5
(38)
Showing 41 - 60 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)