CAS CS 28319

subject Type Homework Help
subject Pages 9
subject Words 954
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The Microsoft Windows Server interface looks like the interface in ________.
A) client versions of Microsoft Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Answer:
Allowing an attacker to continue working in a system after the attack has been
discovered ________.
A) may allow the company to collect evidence for prosecution
B) can be dangerous by allowing the attacker to do more damage
C) Both A and B
D) Neither A nor B
Answer:
________ are compromised hosts running malware controlled by the hacker.
A) DDoS
B) ICMP
page-pf2
C) Bots
D) None of the above
Answer:
To ensure that a digital certificate is valid, the receiver of the certificate must check
________.
A) the digital signature
B) the valid period
C) Both A and B
D) Neither A nor B
Answer:
The ________ gives the verifier a symmetric session key.
A) ticket-granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
page-pf3
Answer:
A TCP session opening ends with a(n) ________ message.
A) SYN
B) FIN
C) ACK
D) URG
Answer:
Closing all routes of attack into an organization's system(s) is called ________.
A) defense in depth
B) comprehensive security
C) total security
D) access control
Answer:
page-pf4
Today, application proxy firewalls are commonly used ________.
A) to protect internal clients from malicious external servers
B) as main border firewalls
C) Both A and B
D) Neither A nor B
Answer:
How many layers does the OSI architecture have?
A) 3
B) 5
C) 7
D) None of the above.
Answer:
Nearly all main border walls today use ________ filtering.
A) unified threat management
B) stateful packet inspection
C) static packet inspection
page-pf5
D) All of the above
Answer:
The ________ is responsible for integrating the information from the multiple agents
that run on multiple monitoring devices.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer:
________ is one method of thwarting DoS attacks by dropping all IP packets from an
attacker.
A) Black holing
B) ICMP echo
C) P2P redirect
D) None of the above
page-pf6
Answer:
False alarms in an IDS are known as ________.
A) false positives
B) false negatives
C) pranks
D) noise
Answer:
Which of the following can be used as a keying method?
A) Public key encryption for confidentiality
B) MS-CHAP
C) Both A and B
D) None of the above
Answer:
page-pf7
The most popular public key encryption cipher is ________.
A) AES
B) DES
C) RSA
D) ECC
Answer:
For all applications, a basic rule is ________.
A) always trust user input
B) sometimes trust user input
C) never trust user input
D) None of the above
Answer:
Wiping/clearing is the best approach to destroying media.
Answer:
page-pf8
Another name for safeguard is ________.
A) countermeasure
B) compromise
C) Both A and B
D) Neither A nor B
Answer:
SIP proxy servers are used in ________.
A) transport transmissions
B) signaling transmissions
C) Both A and B
D) Neither A nor B
Answer:
The user reaches a webpage before logging in. This is a(n) ________ attack.
page-pf9
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
Answer:
Which of the following statements accurately describes Skype?
A) Skype controls who can register a particular person's name.
B) Skype cannot decrypt or read user traffic.
C) Skype's proprietary software and protocols have not been publicly studied and
approved.
D) None of the above
Answer:
IPsec tunnel mode ________.
A) provides host-to-host protection
B) is firewall-friendly
C) Both A and B
page-pfa
D) Neither A nor B
Answer:
There is(are) ________ NAT traversal method(s).
A) 1
B) 2
C) 7
D) several
Answer:
What were the approximate dollar losses for the series of data breaches against Sony
Corp?
A) $54 million
B) $171 million
C) $254 million
D) $1.6 billion
page-pfb
Answer:
What type of organization is subject to FISMA?
A) E-commerce firms
B) Medical firms
C) Government organizations
D) Companies that accept credit card payments
Answer:
A dual-layer DVD can hold up to about ________ GB.
A) 4
B) 8
C) 12
D) 64
Answer:
page-pfc
When a threat succeeds in causing harm to a business, this is called a ________.
A) breach
B) compromise
C) incident
D) All of the above
Answer:
TCP segment carries octets 4321 through 4371. What will be the acknowledgement
number in the TCP segment that acknowledges this segment?
A) 4321
B) 4371
C) 4372
D) None of the above.
Answer:
A VoIP caller wishing to contact another sends an INVITE message to ________.
A) the caller's H.323 proxy server
B) the receiver's H.323 proxy server
page-pfd
C) the receiver directly
D) None of the above
Answer:
If two hosts are separated by five networks, how many frames will there be along the
way when a host transmits a packet to another host?
A) 1
B) 2
C) 5
D) 10
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.