Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Top of Form
Finish review
Bottom of Form
Started on
Completed on
Time taken
8 mins 6 secs
Marks
24/25
Grade
Question1
Marks: 1
In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side. Choose one answer.
a. DoS
Question2
Marks: 1
A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses. Choose one answer.
a. agent
Question3
Marks: 1
Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as a router and a network address translation (NAT) system. Answer: True False
Question4
Marks: 1
The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system. Choose one answer.
a. egress filtering
Question5
Marks: 1
Question6
Marks: 1
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks. Choose one answer.
a. firewall
Question7
Marks: 1
Trying every likely or possible password for an account is called a(n) ____. Choose one answer.
a. brute force attack
d. packet sniffing
Question8
Marks: 1
An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while its in transit is called ____. Choose one answer.
a. brute force attack
Question9
Marks: 1
____ are designed to interrupt or completely disrupt operations of a network device or network communications. Choose one answer.
a. Trojan horse attacks
Question10
Marks: 1
A ____ is a weak spot or known place of attack on any common operating system, application, or service. Choose one answer.
a. back door
Question11
Marks: 1
Internet Security IP implementations make it possible to encrypt and protect segments at the Transport layer, thereby protecting the contents of all communications across the Internet at the Transport layer. Answer: True False
Question12
Marks: 1
____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer. Choose one answer.
a. SA bundle
Question13
Marks: 1
A ____ is a specially, hardened software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks. Choose one answer.
a. firewall
Question14
Marks: 1
____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities. Choose one answer.
a. Ingress filtering
Question15
Marks: 1
A ____ is an area thats accessible to both outsiders and insiders, but which establishes a buffer area between whats completely inside and outside a network boundary. Choose one answer.
a. firewall
Question16
Marks: 1
Because of TCP/IPs optimistic security model, basic fundamental protocols offer no built-in security controls. Answer: True False
Question17
Marks: 1
A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack. Choose one answer.
a. router
Question18
Marks: 1
____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature. Choose one answer.
a. SA bundle
Question19
Marks: 1
A function that provides ____ checks the integrity of each packet individually. Choose one answer.
a. access control
Question20
Marks: 1
____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information. Choose one answer.
a. Access control
b. Connectionless integrity
Question21
Marks: 1
A ____ is an undocumented and illicit point of entry into an operating system or application added by a systems programmers to bypass normal security. Choose one answer.
a. back door
Question22
Marks: 1
A(n) ____ is a kind of virus that eschews most activity except as it relates to self-replication. Choose one answer.
a. Trojan horse
Question23
Marks: 1
____ is the ability to verify that the data received did in fact come from the named source. Choose one answer.
a. Access control
Question24
Marks: 1
A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections. Answer: True False
Question25
Marks: 1
In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang. Choose one answer.
a. DoS
Top of Form
Finish review
Bottom of Form