CICS 39506

subject Type Homework Help
subject Pages 19
subject Words 1878
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The attacker sends a mal-formed TCP segment. The victim host sends back a TCP RST
message. This exchange verifies that the victim host exists and has a certain IP address.
Answer:
Prosecuting attackers in other countries is relatively straightforward under existing
computer crime laws.
Answer:
Mobile code usually is contained in webpages.
Answer:
Walkthroughs are better than live tests because walkthroughs can reveal subtleties that
live tests may miss.
page-pf2
Answer:
The password SeAtTle can be broken by a dictionary attack.
Answer:
Most traditional external hackers cause extensive damage or commit theft for money.
Answer:
LINUX commonly uses the rpm method to download patches.
Answer:
False positives are legitimate activities that are flagged as suspicious.
page-pf3
Answer:
A direct attack occurs when an attacker tries to flood a victim with a stream of packets
directly from the attacker's computer.
Answer:
Open networks can be legally accessed by anyone and are frequently posted as such.
Answer:
Guidelines are appropriate in simple and highly certain circumstances.
Answer:
page-pf4
In relational database, an attribute is the same as a tuple or record.
Answer:
In high-risk environments, password reset risks are reduced by requiring the user's
physical presence.
Answer:
Encryption is heavily used in commercial e-mail.
Answer:
In normal ARP traffic, every host can make ARP requests.
page-pf5
Answer:
Fingerprint scanning, which is often deceived, may be acceptable for entry into a
non-sensitive supplies cabinet.
Answer:
CLI shells use more system resources than GUIs.
Answer:
When Emma sends a message to Lucy, Emma will use the public key to encrypt it.
Answer:
page-pf6
Strong security can be an enabler, allowing a company to do things it could not do
otherwise.
Answer:
Wire speed is the maximum speed at which a firewall can filter packets.
Answer:
A magnetic stripe card is an access card that has a built-in microprocessor and memory.
Answer:
Downloading pornography can lead to sexual harassment lawsuits.
Answer:
page-pf7
Electronic employee monitoring is rare.
Answer:
Attacks other than application level attacks usually fail to get through SPI firewalls.
Answer:
The major promise of biometrics is to replace reusable passwords.
Answer:
The subnet mask is one of the three parts of an IP address.
page-pf8
Answer:
One of the most often overlooked mechanisms used to reduce data loss is employee
training.
Answer:
Iris scanning usually is done surreptitiously.
Answer:
The growing number of compliance laws and regulations is driving firms to use formal
governance frameworks to guide their security processes.
Answer:
page-pf9
A connection opening is a state.
Answer:
Encryption is usually fully transparent to the PC user.
Answer:
Computer recover software reports its physical location to a recovery company that
works with the local police to recover the notebook.
Answer:
Carding is more serious than identity theft.
Answer:
page-pfa
If NAT changes the Layer 3 IP destination addresses, the protocol will still work
properly.
Answer:
A mask is needed to identify the size of the network part or of the combined network
and subnet parts.
Answer:
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because
multiple ICMP requests are responded to by a single host.
Answer:
Wiped data can be read.
page-pfb
Answer:
Which of the following is one of the two simple DEFAULT SPI firewall rules for
packets that attempt to open connections?
A) Permit all attempts to open a connection from an internal host to an external host
B) Permit all attempts from external hosts to open a connection with an internal host
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is not a signaling protocol?
A) RTP
B) SIP
C) H.323
D) All of the above ARE signaling protocols.
Answer:
page-pfc
________ is the process of assessing the identity of each individual claiming to have
permission to use a resource.
A) Authorizations
B) Authentication
C) Both A and B
D) Neither A nor B
Answer:
Which comes third in a VoIP packet?
A) RTP header
B) UDP header
C) IP header
D) codec byte stream
Answer:
________ is a standards architecture.
A) ISO
page-pfd
B) OSI
C) Both A and B
D) Neither A nor B
Answer:
In directory servers, ________.
A) there can only be one O in a directory server
B) there can only be one OU in a directory server
C) Both A and B
D) Neither A nor B
Answer:
In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest.
A) fraud
B) extortion
C) hacking
D) abuse
page-pfe
Answer:
________ is a password-cracking method wherein the attacker compares passwords to
lists of common words.
A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Answer:
Spread spectrum transmission is used in wireless LANs ________.
A) to increase transmission speed
B) for security
C) Both A and B
D) Neither A nor B
Answer:
page-pff
The core part of the LINUX operating system is called ________.
A) the foundation
B) UNIX
C) GNU
D) the kernel
Answer:
In IM, ________ servers allow two users to locate each other.
A) index
B) relay
C) presence
D) All of the above
Answer:
Employees are very dangerous because they ________.
A) often have access to sensitive parts of the system
B) are trusted by companies
page-pf10
C) Both A and B
D) Neither A nor B
Answer:
The key to security being an enabler is ________.
A) getting it involved early within the project
B) having strong corporate policies
C) extensive training
D) adequate spending on security
Answer:
Compared to local backup, centralized backup ________.
A) is more capable of enforcing backup policy
B) is more capable of auditing backup policy
C) Both A and B
D) Neither A nor B
page-pf11
Answer:
________ is used by ________ for authentication.
A) EAP, RADUS
B) RADIUS, EAP
C) Both A and B
D) Neither A nor B
Answer:
A ________ attack is an attack that is made before attack signatures for the threat are
defined.
A) zero-day
B) vulnerability based
C) stealth
D) anomaly based
Answer:
page-pf12
TCP segment carries octets 4321 through 4371. What is its sequence number?
A) 4321
B) 4371
C) 4372
D) None of the above.
Answer:
Digital signatures provide ________.
A) message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Answer:
The supplicant creates a message digest by ________.
A) adding the password to the challenge message and hashing the two
B) hashing the plaintext message
C) encrypting the message digest with its own private key
page-pf13
D) None of the above.
Answer:
Hashing is ________.
A) reversible
B) repeatable
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is not one of the AAA controls?
A) Authentication
B) Auditing
C) Accuracy
D) Authorizations
page-pf14
Answer:
Trusting users to do key escrow is risky because ________.
A) the user may not do it
B) the user may not be able to find the key later
C) the user may refuse to give it up if fired
D) All of the above
Answer:
Zero-day attacks might be stopped by ________ detection.
A) signature
B) anomaly
C) Both A and B
D) Neither A nor B
Answer:
page-pf15
What standard did the 802.11 Working Group create to extend 802.1X operation to
WLANs with security for EAP?
A) 802.11i
B) 802.1i
C) 802.1Xi
D) None of the above
Answer:
A(n) ________ is a statement of what should be done under specific circumstances.
A) implementation control
B) policy
C) policy guidance document
D) procedure
Answer:
A technical security architecture includes ________.
A) all of a firm's countermeasures
B) how countermeasures are organized
page-pf16
C) Both A and B
D) Neither A nor B
Answer:
If you will proxy 8 different applications, you will need ________ proxy programs.
A) 2
B) 4
C) 6
D) 8
Answer:
Computer recover software reports its ________ to a recovery company that works with
local police to recover the notebook.
A) physical location
B) logical location
C) IP address
D) None of the above.
page-pf17
Answer:
With RAID 5, the following is achieved ________.
A) Parity
B) Striping
C) Redundancy
D) All of the above
Answer:
A ________ is a small device that plugs into a standard computer port to identify the
owner.
A) one-time-password token
B) USB token
C) magnetic stripe card
D) smart card
Answer:
page-pf18
________ specifically addresses data protection requirements at financial institutions.
A) GLBA
B) HIPAA
C) The Revised SEC Act
D) Sarbanes-Oxley
Answer:
In the context of PKI, ________ is the process of accepting public keys and providing
new digital certificates to the users.
A) provisioning
B) reflection
C) coordination
D) certification
Answer:
In ________ transfers, each event's data goes to the manager immediately.
A) batch
B) real-time
page-pf19
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is not one of the devices in RADIUS central authentication?
A) The supplicant
B) The verifier
C) The authenticator
D) The RADIUS central authentication server
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.