Exam 3: Network Security
Exam 1: Networking: How We Got Here109 Questions
Exam 2: Network Standards100 Questions
Exam 3: Network Security124 Questions
Exam 4: Network Management93 Questions
Exam 5: Physical Layer Propagation90 Questions
Exam 6: Switched Wired Networks102 Questions
Exam 7: Wireless Networks I78 Questions
Exam 8: Wireless Networks 2102 Questions
Exam 9: Tcp-Ip Internetworking102 Questions
Exam 10: Internetworking 291 Questions
Exam 11: Networked Applications103 Questions
Exam 12: More on Tcp-Ip32 Questions
Exam 13: More on Modulation7 Questions
Exam 14: More on Telecommunications47 Questions
Select questions type
Which of the following can spread more rapidly?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
Malware programs that masquerade as system files are called ________.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
E
With complex passwords,adding a single character increases the number of passwords that must be tried in brute force guessing by a factor of about ________.
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
E
Pieces of code that are executed after the virus or worm has spread are called ________.
(Multiple Choice)
4.8/5
(42)
Rehearsing response during planning makes actual response faster and more effective.
(True/False)
4.9/5
(37)
Which of the following sometimes uses direct propagation between computers?
(Multiple Choice)
4.9/5
(35)
Which phase of the plan-protect-respond cycle takes the largest amount of work?
(Multiple Choice)
4.8/5
(37)
Fingerprint scanning may be an acceptable access control method for ordinary laptops.
(True/False)
4.8/5
(32)
Passwords are widely used because they can be used at no additional cost.
(True/False)
4.9/5
(34)
Viruses most commonly spread from one computer to another ________.
(Multiple Choice)
4.8/5
(24)
In digital certificate authentication,the verifier gets the key it needs from the ________.
(Multiple Choice)
4.7/5
(45)
Hackers identify possible victim computers by sending ________.
(Multiple Choice)
4.8/5
(42)
Which of the following is a propagation vector for some worms?
(Multiple Choice)
4.8/5
(35)
Actions that people are allowed to take on a resource comes under the heading of ________.
(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)