Filters
Question type

Study Flashcards

The password Velociraptor can be defeated most quickly by a ________.


A) dictionary attack
B) hybrid mode dictionary attack
C) brute force attack
D) All of the above could defeat the password equally quickly.

Correct Answer

verifed

verified

Hackers identify possible victim computers by sending ________.


A) scouts
B) probe packets
C) exploits
D) Mocking Jays

Correct Answer

verifed

verified

Stateful firewalls are attractive because of their ________.


A) high filtering sophistication
B) ability to filter complex application content
C) QoS guarantees
D) low cost

Correct Answer

verifed

verified

Malware programs that masquerade as system files are called ________.


A) viruses
B) scripts
C) payloads
D) Trojan horses

Correct Answer

verifed

verified

A password that can be defeated by a hybrid dictionary attack can be adequately long if it ________.


A) can only be broken by a brute force-attack
B) is sufficiently long
C) begins with a capital letter and ends with a digit (number)
D) none of the above

Correct Answer

verifed

verified

Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.


A) have comprehensive security
B) have defense in depth
C) do risk analysis
D) only give minimum permissions

Correct Answer

verifed

verified

Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.


A) authentication
B) confidentiality
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

Identity theft is stealing credit card numbers,in order to make unauthorized purchases.

Correct Answer

verifed

verified

Electronic signatures provide message-by-message ________.


A) authentication
B) confidentiality
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.


A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
D) passes the packet, but notifies an administrator

Correct Answer

verifed

verified

Which of the following can spread more rapidly?


A) directly-propagating viruses
B) directly-propagating worms
C) Both of the above can spread with approximately equal speed.

Correct Answer

verifed

verified

Which of the following is a criterion by which biometrics can be judged?


A) cost
B) susceptibility to deception
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

Cyberwar attacks are made by national governments or organized terrorists.

Correct Answer

verifed

verified

After a break-in,the first step usually is to ________.


A) do damage manually
B) delete log files
C) create a backdoor
D) download a hacker toolkit

Correct Answer

verifed

verified

Mobile code is another name for ________.


A) virus
B) worm
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

How will an SPI firewall handle a packet containing a TCP FIN segment?


A) process it through the ACL
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

In symmetric key encryption,a key must be ________ bits long or longer to be considered strong.(Choose the choice closest to the correct answer.)


A) 40
B) 56
C) 128
D) 1,024

Correct Answer

verifed

verified

Trojan horses can get onto computers by ________.


A) viruses
B) hackers
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

Which of the following is a propagation vector for some worms?


A) e-mail
B) direct propagation
C) both A and B
D) neither A nor B

Correct Answer

verifed

verified

The password Velociraptor is adequately strong.

Correct Answer

verifed

verified

Showing 21 - 40 of 152

Related Exams

Show Answer