Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a firewall does not have the processing power to filter all of the packets that arrive,________.

(Multiple Choice)
4.8/5
(36)

Which type of firewall filtering looks at application-layer content?

(Multiple Choice)
4.9/5
(35)

The password "velociraptor" can be defeated most quickly by a ________.

(Multiple Choice)
4.9/5
(41)

Using SSL/TLS for Web applications is attractive because SSL/TLS ________.

(Multiple Choice)
4.9/5
(31)

In symmetric key encryption,a key must be ________ bits long,or longer,to be considered strong.(Choose the choice closest to the correct answer.)

(Multiple Choice)
4.8/5
(30)

How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP FIN segment?

(Multiple Choice)
4.8/5
(35)

Which of the following can be done today without the target's knowledge?

(Multiple Choice)
4.9/5
(32)

Who are the most dangerous types of employees?

(Multiple Choice)
4.8/5
(43)

Which of the following probably suffered the most financial damage from the Target breach?

(Multiple Choice)
4.9/5
(38)

Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)

(Multiple Choice)
4.7/5
(39)

Advanced persistent threats are ________.

(Multiple Choice)
4.8/5
(38)

A firewall will drop a packet if it ________.

(Multiple Choice)
4.8/5
(33)

Malware programs that masquerade as system files are called ________.

(Multiple Choice)
4.9/5
(35)

Electronic signatures provide message-by-message ________.

(Multiple Choice)
5.0/5
(41)

Small malware programs that download larger malware programs are called ________.

(Multiple Choice)
4.9/5
(31)

Which of the following is a form of biometrics?

(Multiple Choice)
4.9/5
(29)

DoS attacks attempt to ________.

(Multiple Choice)
4.8/5
(42)

Requiring someone to use a resource to prove his or her identity is ________.

(Multiple Choice)
4.8/5
(29)

A specific encryption method is called a ________.

(Multiple Choice)
4.8/5
(32)

A program that can capture passwords as you enter them is ________.

(Multiple Choice)
5.0/5
(39)
Showing 61 - 80 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)