Exam 4: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What type of attacker are most attackers today?

(Multiple Choice)
4.8/5
(34)

In most encryption,keys must be at least ________ long to be considered safe.

(Multiple Choice)
4.8/5
(41)

Iris scanning is attractive because of its ________.

(Multiple Choice)
4.8/5
(39)

In authentication,________ are the general name for proofs of identity.

(Multiple Choice)
4.9/5
(33)

Digital certificate authentication fails if the supplicant ________.

(Multiple Choice)
4.9/5
(34)

The Target attackers probably first broke into Target using the credentials of a(n)________.

(Multiple Choice)
4.8/5
(39)

Employees often attack ________.

(Multiple Choice)
5.0/5
(33)

NIST guidelines for reusable passwords permit ________.

(Multiple Choice)
4.9/5
(39)

Why are employees especially dangerous?

(Multiple Choice)
4.9/5
(39)

Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.

(Multiple Choice)
4.9/5
(33)

The general term for evil software is ________.

(Multiple Choice)
4.9/5
(40)

If you see a username and password on a Post-It note that anyone can see on a monitor,is it hacking if you use this information to log in?

(Multiple Choice)
4.7/5
(36)

Which of the following can be upgraded after it is installed on a victim computer (choose the most specific answer)?

(Multiple Choice)
4.8/5
(33)

Which of the following is the most frustrating to use?

(Multiple Choice)
4.8/5
(42)

Which of the following can spread very rapidly?

(Multiple Choice)
4.9/5
(35)

Hacking is defined as using a computer resource without authorization or in excess of authorization.

(True/False)
4.7/5
(31)

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.

(Multiple Choice)
4.9/5
(32)

Users typically can eliminate a vulnerability in one of their programs by ________.

(Multiple Choice)
4.8/5
(35)

________ is the dominant firewall filtering method used on main border firewalls today.

(Multiple Choice)
4.9/5
(41)

________ is a program that can capture passwords as you enter them.

(Multiple Choice)
4.8/5
(48)
Showing 61 - 80 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)