Exam 3: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Firewall log files should be read ________.

(Multiple Choice)
4.8/5
(42)

Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.(Select the best answer.)

(Multiple Choice)
5.0/5
(32)

SSL-TLS is a cryptographic system standard.

(True/False)
4.8/5
(43)

A Trojan horse that sorts through files on the victim's computer to look for useable information is called ________.

(Multiple Choice)
4.9/5
(42)

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.(Read this question carefully)

(Multiple Choice)
4.9/5
(39)

When a firewall identifies an attack packet,it ________.

(Multiple Choice)
4.9/5
(42)

Mobile code is another name for ________.

(Multiple Choice)
4.8/5
(39)

Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.

(Multiple Choice)
4.7/5
(42)

Biometrics is the use of body measurements to authenticate you.

(True/False)
4.9/5
(46)

In two-way dialogues using symmetric key encryption,how many keys are used for encryption and decryption?

(Multiple Choice)
4.9/5
(37)

Balancing threats against protection costs is called ________.

(Multiple Choice)
4.9/5
(41)

Which of the following can thwart directly-propagating worms?

(Multiple Choice)
4.8/5
(40)

Which of the following is NOT one of the four major security planning principles?

(Multiple Choice)
4.7/5
(34)

In digital certificate authentication,the supplicant does a calculation with ________.

(Multiple Choice)
4.8/5
(37)

A password cracking attack that tries all combinations of keyboard characters is called a ________.

(Multiple Choice)
4.7/5
(26)

Computer security incident response teams (CSIRTs)are used in ________.

(Multiple Choice)
4.9/5
(37)

________ is the reestablishment of information technology operations after a disaster.

(Multiple Choice)
4.8/5
(43)

Scripts may execute software when a webpage is downloaded.

(True/False)
4.9/5
(31)

Users typically can eliminate a vulnerability in one of their programs by ________.

(Multiple Choice)
4.9/5
(33)

Which has stronger security?

(Multiple Choice)
4.7/5
(46)
Showing 101 - 120 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)