CAS CS 78350

subject Type Homework Help
subject Pages 9
subject Words 1046
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A(n) ________ is defined as an attack that comes before fixes are released.
A) exploit
B) zero-day attack
C) worm
D) anomaly attack
Answer:
________ ciphers leave letters in their original positions.
A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Answer:
________ allows for very recent file changes to be restored.
A) Shadowing
B) File backup
C) File/folder backup
page-pf2
D) Image backup
Answer:
________ can be used to supply power during long power outages.
A) Uninterruptable power supplies
B) Electrical generators
C) Both A and B
D) Neither A nor B
Answer:
HMACs provide the cryptographic protection of ________.
A) message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
page-pf3
Answer:
Firewall policies should govern ________.
A) configuration
B) testing
C) Both A and B
D) Neither A nor B
Answer:
A major security incident is generally handled by the ________.
A) IT disaster response team
B) business continuity team
C) CSIRT
D) All of the above
Answer:
page-pf4
If you will proxy four different applications, how many proxy programs will you need?
A) 1
B) 2
C) 4
D) 8
Answer:
SIP requires port ________ to be open.
A) 47
B) 505
C) 3434
D) 5060
Answer:
A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice.)
A) DoS
B) directly-propagating worm
page-pf5
C) distributed malware
D) SYN Flooding
Answer:
________ introduced community strings for security, in which a shared secret was used
to authenticate messages.
A) SNMP V1
B) SNMP V2
C) SNMP V3
D) None of the above
Answer:
Shredding is the best approach to destroying media.
Answer:
page-pf6
Static packet filtering firewalls are limited to ________.
A) inspecting packets for which there are good application proxy filtering rules
B) inspecting packets in isolation from their context
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is a way of responding to risk with active countermeasures?
A) Risk reduction
B) Risk acceptance
C) Risk avoidance
D) All of the above
Answer:
The main exterior dynamic routing protocol is ________.
A) OSPF
B) RIP
page-pf7
C) BGP
D) EIGRP
Answer:
Almost all main border firewalls use ________ filtering as their primary filtering
mechanism.
A) unified threat management
B) application proxy
C) static packet filtering
D) None of the above
Answer:
In a stack overflow attack, to where does the return address point?
A) To the beginning of the stack entry's data area
B) To the end of the stack entry's data area
C) To the next command in the program being hacked
D) To the return address entry in the stack entry
page-pf8
Answer:
In UNIX, the ________ permission allows the user to make changes.
A) execute
B) write
C) read
D) modify
Answer:
In a(n) ________ attack, the user enters part of a database query instead of giving the
expected input.
A) login screen bypass
B) buffer overflow
C) XSS
D) SQL injection attack
Answer:
page-pf9
Someone who breaks encryption is called a ________.
A) cracker
B) coder
C) hacker
D) cryptanalyst
Answer:
________ is the centralized policy based management of all information required for
access to corporate systems by people, machines, programs, or other resources.
A) Directory service
B) Meta-directory service
C) Identity management
D) Meta-identity management
Answer:
A ________ is a cryptographic system that provides secure communication over an
untrusted network.
A) virtual private network
B) secure link
page-pfa
C) complete cryptographic system
D) None of the above.
Answer:
A ________ is an individual application on the tree pane of an MMC that can be added
or dropped from the tree list easily.
A) snap-in
B) management application
C) administrative application
D) Action
Answer:
Most firms actually use the ________ architecture.
A) TCP/IP
B) OSI
C) IETF
D) None of the above.
page-pfb
Answer:
A ________ attack is when a victim is flooded with ICMP packets that appear to be
normal supervisory traffic.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Answer:
If an attacker breaks into a corporate database and deletes critical files, this is a attack
against the ________ security goal.
A) integrity
B) confidentiality
C) Both A and B
D) Neither A nor B
Answer:
page-pfc
A Windows host sends a TCP segment with source port number 1200 and destination
port number 25. The sending host is a(n) ________.
A) client
B) TCP server
C) webserver
D) e-mail server
Answer:
What is the SPI firewall rule for packets that only have their TCP ACK bits set but no
other flags set?
A) Drop the packet unless it is permitted by an ACL
B) Pass the packet unless it is forbidden by an ACL
C) Pass the packet if it is part of a previously approved connection
D) Either A or B
Answer:
A PSTN gateway translates between a VoIP network's ________ protocols and those of
the public switched telephone network.
page-pfd
A) signaling
B) transport
C) Both A and B
D) Neither A nor B
Answer:
Which organization creates Internet standards?
A) DARPA
B) IETF
C) ISO
D) TCP
Answer:
Which of the following is one of the key lengths offered by AES?
A) 112 bits
B) 192 bits
C) Both A and B
D) Neither A nor B
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.