Exam 4: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker.

(Multiple Choice)
4.7/5
(32)

Which type of firewall is more expensive per packet handled?

(Multiple Choice)
4.8/5
(37)

Who mounts APTs today?

(Multiple Choice)
4.9/5
(38)

Which of the following attach themselves to other programs?

(Multiple Choice)
4.8/5
(27)

Requiring someone prove his or her identity is ________.

(Multiple Choice)
4.9/5
(36)

Fingerprint recognition is generally acceptable for ________.

(Multiple Choice)
4.8/5
(35)

If a packet is highly suspicious but not a provable attack packet,an ________ may drop it.

(Multiple Choice)
4.8/5
(35)

A debit card is secure because it requires two credentials for authentication-the card itself and a PIN.This is called ________.

(Multiple Choice)
4.9/5
(46)

In general,what type of attackers do the most damage?

(Multiple Choice)
4.8/5
(36)

The messages of VPNs ________.

(Multiple Choice)
4.9/5
(37)

Viruses and worms propagate through ________.

(Multiple Choice)
4.8/5
(30)

________ attacks typically extend over a period of months.

(Multiple Choice)
4.8/5
(46)

________ are full programs.

(Multiple Choice)
4.7/5
(39)

Which type of firewall filtering collects streams of packets to analyze them as a group?

(Multiple Choice)
4.9/5
(34)

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.

(Multiple Choice)
4.7/5
(34)

What kind of attack is most likely to succeed against a system with no technological vulnerabilities?

(Multiple Choice)
4.7/5
(41)

For consumers who suffered credit card fraud because of the Target breach and acted quickly,which of the following is true?

(Multiple Choice)
4.8/5
(41)

In SPI firewalls,ACLs are used for packets in the ________ state.

(Multiple Choice)
4.9/5
(36)

You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see.You exit without looking around.is that hacking?

(Multiple Choice)
4.9/5
(38)

You accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail.Is that hacking?

(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)