Exam 4: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following were able to recoup most of the money they lost from Target?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

Pieces of code that are executed after the virus or worm has spread are called ________.

Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
Verified

D

Which type of firewall filtering looks at application-layer content?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

Using bodily measurements for authentication is ________.

(Multiple Choice)
4.8/5
(38)

In ________ thinking,the opponent is primarily an intelligent attacker.

(Multiple Choice)
4.9/5
(40)

Secured packets typically receive ________.

(Multiple Choice)
4.9/5
(43)

Malware programs that masquerade as system files are called ________.

(Multiple Choice)
4.8/5
(40)

A spear phishing attack is usually aimed at ________.

(Multiple Choice)
4.8/5
(33)

Using SSL/TLS for Web applications is attractive because SSL/TLS ________.

(Multiple Choice)
4.9/5
(30)

How did the Target attackers obtain the stolen information?

(Multiple Choice)
4.9/5
(39)

Which of the following meets the definition of hacking?

(Multiple Choice)
4.7/5
(31)

Electronic signatures provide message-by-message ________.

(Multiple Choice)
4.8/5
(44)

When a firewall identifies an attack packet,it ________.

(Multiple Choice)
4.9/5
(38)

Which of the following probably suffered the most financial damage from the Target breach?

(Multiple Choice)
4.7/5
(42)

Cyberwar attacks are made by ________.

(Multiple Choice)
5.0/5
(36)

________ attackers are often well-funded.

(Multiple Choice)
4.9/5
(37)

Which form of authentication depends on the supplicant proving that she knows something only the true party should know?

(Multiple Choice)
5.0/5
(35)

You are concerned with the security of a site you use and run a vulnerability test against it.The test reveals a security threat.Is this hacking?

(Multiple Choice)
4.9/5
(41)

DoS attacks attempt to ________.

(Multiple Choice)
4.8/5
(40)

Which is more harmful to the victim?

(Multiple Choice)
4.8/5
(27)
Showing 1 - 20 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)