CAPP 37828

subject Type Homework Help
subject Pages 16
subject Words 1588
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Total software reinstallation effectively addresses data loss.
Answer:
The most common attack against a wireless network is a wireless DoS attack.
Answer:
Under current U.S. federal laws, if a company allows personal information to be stolen,
it may be subject to government fines.
Answer:
Website defacement occurs when attackers take over a computer and produce false web
pages.
Answer:
page-pf2
If a hacker takes over an application program, he or she receives the permissions with
which the program runs.
Answer:
The purpose of egress firewall filtering is to stop attack packets from entering the firm's
internal network.
Answer:
Internal corporate attackers often have a history of overt unacceptable behavior.
Answer:
An application proxy firewall needs have multiple proxy programs if it is to filter
page-pf3
multiple application protocols.
Answer:
Interactive log file analysis can filter out irrelevant entries.
Answer:
Placing IT auditing in an existing auditing department would give independence from
IT security.
Answer:
Restoration from backup tapes is one way to move files to the backup site.
Answer:
page-pf4
The term sanitizing has lost its distinct meaning as special laboratory methods become
ineffective.
Answer:
UDP is a good protocol for applications that need reliability.
Answer:
WEP uses RC4 for fast and therefore cheap encryption.
Answer:
Most DoS attacks are difficult to detect.
page-pf5
Answer:
If Directory Server A trusts Directory Server B and Directory Server B trusts Directory
Server C then Directory Server A MUST trust Directory Server C.
Answer:
Courts will often admit unreliable evidence if judges believe that juries can be trusted to
evaluate it properly.
Answer:
Passwords offer reasonable security at reasonable cost and will likely continue to
increase in importance in the future.
Answer:
page-pf6
A system using an array of drives increases reliability.
Answer:
It is OK for a verifier to receive digital certificates from the sender.
Answer:
In federated identity management, firms do not query one another's identity
management databases.
Answer:
With good planning and protection, a company can eliminate security incidents.
page-pf7
Answer:
Many companies continue to use WEP to avoid the cost of reconfiguring all of their
access points and clients to 802.11i and because WEP has not been fully cracked yet.
Answer:
RC4 uses WEP for fast and therefore cheap encryption.
Answer:
Exceptions in policies and procedures should be forbidden.
Answer:
page-pf8
Nearly all applications can be proxied effectively.
Answer:
Reading firewall logs requires limited time in firewall administration.
Answer:
Both TCP and UDP can be used by an application .
Answer:
For message-by-message authentication, each message must contain an electronic
signature.
Answer:
page-pf9
VoIP security can easily be implemented even if the company's basic security is weak.
Answer:
Most IT security analysts recommend placing IT security functions within the IT
department.
Answer:
Transport consists of communication to manage the network.
Answer:
HMACs provide the cryptographic protection of ________.
A) authentication
page-pfa
B) nonrepudiation
C) Both A and B
D) Neither A nor B
Answer:
In ________ transfers, the agent waits until it has several minutes or several hours of
data and then sends a block of log file data to the manager.
A) batch
B) real-time
C) Both A and B
D) Neither A nor B
Answer:
What is the hash size of SHA-256?
A) 112 bits
B) 128 bits
C) 160 bits
D) 256 bits
page-pfb
Answer:
The book recommends that passwords be at least ________ characters long.
A) 6
B) 8
C) 20
D) 100
Answer:
Frames are messages traveling through ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Answer:
page-pfc
A(n) ________ is a statement from Firm A that Firm B should accept as true if Firm B
trusts Firm A.
A) certification
B) assertion
C) certificate
D) attribute
Answer:
Which version of SNMP allows the manager to have a different shared secret with each
agent?
A) Version 1
B) Version 2
C) Version 3
D) All of the above
Answer:
Any device with an IP address is a ________.
A) server
page-pfd
B) host
C) client
D) None of the above
Answer:
After destroying, data is ________.
A) recoverable
B) reusable
C) Both A and B
D) Neither A nor B
Answer:
A ________ is a small device with a display that has a number that changes frequently.
A) one-time-password token
B) USB token
C) magnetic stripe card
D) None of the above
page-pfe
Answer:
In a virus, the code that does damage is called the ________.
A) exploit
B) compromise
C) payload
D) vector
Answer:
The analysis of multi-event patterns is called ________.
A) event correlation
B) aggregation
C) filtering
D) All of the above
Answer:
page-pff
The attack method used in the Sony data breaches was ________.
A) Cross-site scripting
B) SQL injection
C) Denial of service
D) None of the above
Answer:
UNIX command line interfaces are called ________.
A) shells
B) GUIs
C) Both A and B
D) Neither A nor B
Answer:
________ can spread through e-mail attachments.
A) Viruses
B) Worms
page-pf10
C) Both A and B
D) Neither A nor B
Answer:
________ do not drop packets.
A) IDSs
B) IPSs
C) Firewalls
D) All of the above drop packets.
Answer:
The supplicant creates a digital signature by ________.
A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
page-pf11
Answer:
What e-mail standard provides end-to-end security?
A) SSL/TLS
B) S/MIME
C) Both A and B
D) Neither A nor B
Answer:
A flag field has the value 1.
A) The TCP segment is an acknowledgement.
B) The field is set.
C) The field is locked.
D) The router will reduce the value to 0 and drop the packet.
Answer:
page-pf12
When both parties prove their identities to the other, this is called ________.
A) mutual authentication
B) symmetric authentication
C) authentication
D) dual authentication
Answer:
________ is the process of obscuring data such that it cannot identify a specific person,
but remains practically useful.
A) DLP
B) PII
C) Data masking
D) None of the above
Answer:
In a TCP half-open DoS attack, ________.
A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
page-pf13
C) Both A and B
D) Neither A nor B
Answer:
Penalties for hacking are ________.
A) limited only if a hacker stole $1000
B) limited only if a hacker stole over $1,000,000
C) irrelevant of the amount stolen
D) none of the above
Answer:
Sophisticated attacks often are difficult to identify amid the "noise" of many ________
attacks.
A) distributed malware
B) DoS attacks
C) script kiddie
D) virus
page-pf14
Answer:
Inheritance ________ labor costs in assigning permissions.
A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above
Answer:
Integrated log files ________.
A) tend to have problems with format incompatibilities
B) tend to have time synchronization problems
C) Both A and B
D) Neither A nor B
Answer:
page-pf15
User computers connect to ________ switches.
A) core
B) primary
C) workgroup
D) terminal
Answer:
________ punishments may result in fines.
A) Criminal
B) Civil
C) Both A and B
D) Neither A nor B
Answer:
________ record(s) and analyzes what a person or program actually did.
A) Authentication
B) Authorizations
C) Auditing
page-pf16
D) All of the above
Answer:
In cryptographic systems, the negotiation of security methods and options takes place
during the ________ handshaking stage.
A) first
B) second
C) third
D) None of the above
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.