CMCS 19544

subject Type Homework Help
subject Pages 17
subject Words 1706
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Botnets usually have multiple owners over time.
Answer:
Wireless attacks avoid the access points to limit detection.
Answer:
In authentication, the party trying to provide its identity to the other party is called the
applicant.
Answer:
Scripts do not have the ability to permanently change your computer registry.
Answer:
page-pf2
If a PC user has full-disk encryption, a weak password is not as great a danger as it
would be if the disk were not encrypted.
Answer:
Independence is best provided for IT security by placing it within the IT department.
Answer:
In a large organization, WEP rekeying is inexpensive.
Answer:
Intercepting wireless LAN transmissions is difficult.
page-pf3
Answer:
Skype's security protocols have been publicly studied and approved.
Answer:
It is a good idea to view the security function as a police force or military organization.
Answer:
Companies can nearly always stop DoS attacks without assistance from ISPs and other
upstream agencies.
Answer:
page-pf4
The FTC can act against companies that fail to take reasonable precautions to protect
privacy information.
Answer:
PCs should require login screens with complex passwords.
Answer:
An attacker who captures the keying information in Diffie-Hellman key agreement can
compute the symmetric session key.
Answer:
By giving unauthorized users access to a local WLAN means that they are on the local
network.
page-pf5
Answer:
It is mandatory for decision makers to consider guidelines.
Answer:
A specific distribution of UNIX comes with multiple user interfaces.
Answer:
Rehearsing IT disaster recovery procedures is essential to improve response speed and
accuracy.
Answer:
page-pf6
"Breadth of the perimeter" is a phrase used by network administrators to convey that
creating a 100% secure network is possible.
Answer:
According to the author, information assurance is a good name for IT security.
Answer:
Stateful packet inspection firewalls use relay operation with two connections per
client/server pair.
Answer:
ARP is used to resolve 48-bit IP addresses into 32-bit local MAC addresses.
Answer:
page-pf7
Cybercriminals avoid black market forums.
Answer:
A patch is a labor-intensive process of manual steps that a firm must do to address a
vulnerability.
Answer:
Typically, the shadow storage space is nearly unlimited.
Answer:
In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is
the same.
page-pf8
Answer:
Most message-by-message authentication methods provide message integrity as a
by-products.
Answer:
Symmetric session key exchange can be done with public key encryption.
Answer:
Threat environment consists of the types of attackers and attacks that companies face.
Answer:
page-pf9
Planning, protection, and response follow a fairly strict sequence from one stage to
another.
Answer:
Password cracking is usually done over the network by trying many passwords to log
into an account.
Answer:
What time of filtering do UTM firewalls provide?
A) IDS Service
B) Antivirus filtering
C) Both A and B
D) Neither A nor B
Answer:
page-pfa
A ________ is a small program that, after installed, downloads a larger attack program.
A) Trojan horse
B) Trojan pony
C) Stub
D) Downloader
Answer:
Developers have permissions on the ________.
A) development server
B) testing server
C) production server
D) Both A and B
Answer:
The original 802.11 core security protocol, ________, was deeply flawed.
A) 802.11i
B) WPA
page-pfb
C) WEP
D) None of the above. The original core protocol was NOT deeply flawed.
Answer:
________ errors may indicate that an attacker is trying to send invalid data to the
server.
A) 404
B) 303
C) 500
D) 512
Answer:
Data destruction is ________.
A) optional
B) necessary
C) Both A and B
D) Neither A nor B
page-pfc
Answer:
In Kerberos, the ________ is sent from the Kerberos server to the verifier.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer:
A digital certificate ________.
A) indicates that the person or firm named in the certificate is reasonably trustworthy
B) gives the subject's public key
C) Both A and B
D) Neither A nor B
Answer:
page-pfd
To check a certificate's revocation status, the verifier can ________.
A) download the CRL from the CA
B) send an OCSP message to the CA
C) Both A and B
D) Neither A nor B
Answer:
To meet national export limitation in many countries, RC4 often uses a key length of
________ bits.
A) 8
B) 40
C) 100
D) 256
Answer:
Central security consoles ________.
A) are dangerous
B) allow policies to be applied consistently
page-pfe
C) Both A and B
D) Neither A nor B
Answer:
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if
it is extended to 50 bits?
A) 7 times as long
B) 14 times as long
C) 128 times as long
D) 256 times as long
Answer:
Under what Internet Options tabs are general security settings for websites controlled?
A) Privacy
B) Security
C) Protection
D) Advanced
page-pff
Answer:
Rerouting traffic using ARP poisoning is an attack on ________ of a network.
A) functionality
B) confidentiality
C) Both A and B
D) None of the above
Answer:
A ________ does not require a special reader to be added to a PC for access control.
A) USB token
B) magnetic stripe card
C) smart card
D) All of the above
Answer:
page-pf10
In Kerberos, the ________ is an encrypted session key that only the verifier can
decrypt.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer:
Someone breaks into a corporate VoIP system to place free long-distance and
international toll calls. This is referred to by security professionals as ________.
A) toll fraud
B) VoIP hacking
C) phone phreaking
D) blue boxing
Answer:
In 802.1X, the heavy authentication work is done on ________.
A) authenticators
B) clients
page-pf11
C) Both A and B
D) Neither A nor B
Answer:
Physical and data link layer standards govern transmission in ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Answer:
If a laptop needs to be taken off premises, ________.
A) it should first be logged out.
B) it should be logged in when returned
C) all sensitive information should be removed
D) All of the above
page-pf12
Answer:
When a new EAP authentication is added, software has to be changed on the ________.
A) authenticator
B) central authentication server
C) Both A and B
D) Neither A nor B
Answer:
________ uses options frequently.
A) IP
B) TCP
C) Both A and B
D) Neither A nor B
Answer:
page-pf13
To satisfy legal retention and other compliance regulations, companies should use
________ in IM.
A) a presence server
B) a relay server
C) Either A or B
D) Neither A nor B
Answer:
Wal-Mart was able to respond to hurricane Katrina so quickly because it had ________.
A) detailed business continuity plans
B) a full-time director of business continuity
C) Both A and B
D) Neither A nor B
Answer:
A ________ is a mathematical process used in encryption and decryption.
A) key
B) cipher
page-pf14
C) plaintext
D) coding method
Answer:
Quantum key distribution ________.
A) is a way to deliver enormously long keys to communication partners
B) creates a major threat to many traditional cryptographic methods
C) Both A and B
D) Neither A nor B
Answer:
________ are descriptions of what the best firms in the industry are doing about
security.
A) Best practices
B) Recommended practices
C) Both A and B
D) Neither A nor B
page-pf15
Answer:
Servers get ________.
A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Answer:
________ is a version of ________ for PCs.
A) LINUX, UNIX
B) UNIX, LINUX
C) Both A and B
D) Neither A nor B
Answer:
page-pf16
In biometric, a match occurs when a ________ meets the decision criteria.
A) set of key features
B) match index
C) Both A and B
D) Neither A nor B
Answer:
Data breach notification laws typically ________.
A) require companies to notify affected people if sensitive personally identifiable
information is stolen or even lost
B) have caused companies to think more about security
C) Both A and B
D) Neither A nor B
Answer:
________ is not limited to TCP/IP routing.
A) OSPF
B) RIP
page-pf17
C) BGP
D) EIGRP
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.