Deck 6: Intrusion and Emailinternet Security Techniques
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 6: Intrusion and Emailinternet Security Techniques
1
Which of the following is a non-technical type of intrusion or attack technique?
A)reverse engineering
B)malware analysis
C)social engineering
D)malware writing
A)reverse engineering
B)malware analysis
C)social engineering
D)malware writing
social engineering
2
If the data stored in the_______ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
A)memory
B)quarantine
C)cookies
D)hard drive
A)memory
B)quarantine
C)cookies
D)hard drive
cookies
3
The stored cookie which contains all your personal data about that website can be stolen away by________using or trojans.
A)attackers, malware
B)hackers, antivirus
C)penetration testers, malware
D)penetration testers, virus
A)attackers, malware
B)hackers, antivirus
C)penetration testers, malware
D)penetration testers, virus
attackers, malware
4
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of them is not a proper method for email security?
A)use strong password
B)use email encryption
C)spam filters and malware scanners
D)click on unknown links to explore
A)use strong password
B)use email encryption
C)spam filters and malware scanners
D)click on unknown links to explore
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
What are email security services?
A)confidentiality
B)authentication
C)non-repudation of origin
D)all of the above
A)confidentiality
B)authentication
C)non-repudation of origin
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
PGP security system uses
A)public key cryptosystem
B)private key cryptosystem
C)public & private key cryptosystem
D)none of the mentioned
A)public key cryptosystem
B)private key cryptosystem
C)public & private key cryptosystem
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
What is the key size allowed in PGP?
A)1024-1056
B)1024-4056
C)1024-4096
D)1024-2048
A)1024-1056
B)1024-4056
C)1024-4096
D)1024-2048
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Who created PGP?
A)phil zimmermann
B)tim berners-lee
C)marc andreessen
D)ken thompson
A)phil zimmermann
B)tim berners-lee
C)marc andreessen
D)ken thompson
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
What is the PGP stand for?
A)permuted gap permission
B)permuted great privacy
C)pretty good privacy
D)none of the mentioned
A)permuted gap permission
B)permuted great privacy
C)pretty good privacy
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
PGP makes use of which cryptographic algorithm?
A)des
B)aes
C)rsa
D)rabin
A)des
B)aes
C)rsa
D)rabin
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
PGP offers_______block ciphers for message encryption?
A)triple-des
B)cast
C)idea
D)all of the above
A)triple-des
B)cast
C)idea
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
S/MIME stands for________ .
A)standard multipurpose internet mail extensions.
B)secure multipurpose internet mail extensions.
C)secure multipurpose international mail extensions
D)standard multipurpose international mail extensions.
A)standard multipurpose internet mail extensions.
B)secure multipurpose internet mail extensions.
C)secure multipurpose international mail extensions
D)standard multipurpose international mail extensions.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
is used for hiding the payment information from the merchant.
A)set.
B)ssl.
C)shttp
D)tsp
A)set.
B)ssl.
C)shttp
D)tsp
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The cryptography algorithms used in S/MIME are .
A)idea.
B)rc4
C)rsa,des-3
D)rc5
A)idea.
B)rc4
C)rsa,des-3
D)rc5
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
In S/MIME,MLA stands for .
A)mailing list agent.
B)multipurpose list agent.
C)mail lock agent.
D)message link agen
A)mailing list agent.
B)multipurpose list agent.
C)mail lock agent.
D)message link agen
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which component is included in IP security?
A)authentication header (ah)
B)encapsulating security payload (esp)
C)internet key exchange (ike)
D)all of the mentioned
A)authentication header (ah)
B)encapsulating security payload (esp)
C)internet key exchange (ike)
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
WPA2 is used for security in
A)ethernet
B)bluetooth
C)wi-fi
D)email
A)ethernet
B)bluetooth
C)wi-fi
D)email
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
An attempt to make a computer resource unavailable to its intended users is called
A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
PGP is used in
A)browser security
B)email security
C)ftp security
D)wifi security
A)browser security
B)email security
C)ftp security
D)wifi security
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
In tunnel mode, IPSec protects the
A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
IPSec is designed to provide security at the
A)transport layer
B)network layer
C)application layer
D)session layer
A)transport layer
B)network layer
C)application layer
D)session layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is not a strong security protocol?
A)https
B)ssl
C)smtp
D)sftp
A)https
B)ssl
C)smtp
D)sftp
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
SSL primarily focuses on
A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Why did SSL certificate require in HTTP?
A)for making security weak
B)for making information move faster
C)for encrypted data sent over http protocol
D)for sending and receiving emails unencrypted
A)for making security weak
B)for making information move faster
C)for encrypted data sent over http protocol
D)for sending and receiving emails unencrypted
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck