Exam 4: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Traditionally,we have told users that passwords ________.

(Multiple Choice)
4.9/5
(44)

In a DDoS attack,a ________ sends messages directly to the victim.

(Multiple Choice)
4.8/5
(35)

In distributed DoS attacks,the attacker sends messages directly to ________.

(Multiple Choice)
4.8/5
(36)

The supplicant is ________.

(Multiple Choice)
4.9/5
(36)

Authentication should generally be ________.

(Multiple Choice)
4.8/5
(39)

Trojan horses can spread by ________.

(Multiple Choice)
4.7/5
(41)

Advanced persistent threats are ________.

(Multiple Choice)
4.8/5
(35)

In general,what should an employer do whenever an employee leaves the firm?

(Multiple Choice)
4.9/5
(39)

In which type of attack does the attacker gather extensive sensitive personal information about its victim?

(Multiple Choice)
4.8/5
(38)

The supplicant claims to be ________.

(Multiple Choice)
4.7/5
(43)

Facial recognition is controversial because ________.

(Multiple Choice)
4.7/5
(39)

In encryption,what must be kept secret?

(Multiple Choice)
4.8/5
(45)

In a ________ attack,the attacker encrypts some or all of the victim's hard drive.

(Multiple Choice)
4.8/5
(38)

Who are the most dangerous types of employees?

(Multiple Choice)
4.9/5
(36)

A firewall will drop a packet if it ________.

(Multiple Choice)
4.9/5
(31)

NGFWs ________.

(Multiple Choice)
4.9/5
(42)

Antivirus programs are designed to detect ________.

(Multiple Choice)
4.9/5
(44)

For reusable passwords,NIST now recommends ________.

(Multiple Choice)
4.9/5
(36)

For sensitive assets,reusable passwords ________.

(Multiple Choice)
4.9/5
(44)

In an SPI firewall,all rules except the last will permit the connection.The last will ________.

(Multiple Choice)
4.8/5
(35)
Showing 41 - 60 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)