COP 80874

subject Type Homework Help
subject Pages 20
subject Words 1906
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
When you use your mobile firm to surf the Internet, it is a host.
Answer:
EAP uses RADIUS for authentication.
Answer:
On a compromised computer, if you mistype the name of a URL, you may be taken to a
malicious website even if you set your browser security to high.
Answer:
Antivirus servers can only find viruses, not other types of malware.
Answer:
page-pf2
IDSs need to filter individual packets rather than packet streams.
Answer:
In cryptographic systems, keying takes place during the second handshaking stage.
Answer:
Most CAs are not regulated.
Answer:
Accepting cookies is necessary to use many websites.
page-pf3
Answer:
Skype's file transfer generally does not work with antivirus programs.
Answer:
IDSs drop packets that are merely suspicious.
Answer:
Employees often have extensive knowledge of systems and can pose a greater risk than
external attackers.
Answer:
page-pf4
In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The
servers then send all responses to the victim.
Answer:
The definition of hacking is "intentionally accessing a computer resource without
authorization or in excess of authorization."
Answer:
Security professionals should minimize burdens on functional departments.
Answer:
Skype can decrypt and read user traffic.
Answer:
page-pf5
In Internet Explorer, the Security tab controls the website's pop-up blocker.
Answer:
Spammers are one reason that some companies have outsourced e-mail filtering.
Answer:
In the IETF, a proposed standard is called a Request for Comments.
Answer:
In e-mail, the security standards situation is mature.
page-pf6
Answer:
The IP header checksum field is used for error detection.
Answer:
Main border firewalls rarely use stateful packet inspection.
Answer:
A company should consider list of possible remediation plans as an investment
portfolio.
Answer:
page-pf7
In Windows, a user's effective permissions are all those inherited from its parent
directory plus any specifically allowed permission, minus those denied.
Answer:
All unattended exits should be locked to bar exit.
Answer:
IDSs tend to issue many false negatives.
Answer:
Creating ACLs is the most time-consuming part of firewall management.
Answer:
page-pf8
Nearly all encryption for confidentiality uses symmetric key encryption ciphers.
Answer:
The main standards used by firms to send security assertions to one another is LDAP.
Answer:
The terms "intellectual property" and "trade secret" are synonymous.
Answer:
A company should not replace default passwords during configuration.
page-pf9
Answer:
With local backup processes, policies are easily enforced.
Answer:
When your home PC is on a network, it is a host.
Answer:
In fraud, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest.
Answer:
page-pfa
Black holing is an effective long-term containment solution.
Answer:
Placing sensitive equipment in secure areas to minimize potential threats and damage is
called siting.
Answer:
Having a permanent business continuity staff is necessary.
Answer:
DNS, DHCP, and LDAP are examples of supervisory protocols in TCP/IP.
Answer:
page-pfb
It is getting easier for attackers to bypass the border firewall.
Answer:
Firms can address the increasing ability of attackers to bypass the border firewalls by
________.
A) hardening hosts
B) having multiple border firewalls
C) Both A and B
D) Neither A nor B
Answer:
In ________, signals can be read without tapping the cord.
A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
page-pfc
Answer:
Mandatory vacations should be enforced ________.
A) to improve employee diligence to threats
B) to reduce the possibility of collusion between employees
C) to be in compliance with state and federal law
D) for ethical purposes
Answer:
Who should be involved in the creation of retention policies?
A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B
Answer:
page-pfd
The ultimate goal of a DoS attack is to ________.
A) cause harm
B) frustrate users
C) practice hacking
D) None of the above
Answer:
In Kerberos, the ________ is sent from the Kerberos server to the supplicant.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer:
18 U.S.C. 1030 prohibits ________.
A) hacking
B) malware attacks
page-pfe
C) denial-of-service attacks
D) All of the above
Answer:
Which IPS response to an attack is the most effective in stopping attacks?
A) Dropping packets
B) Limiting suspicious traffic to a certain percentage of the total bandwidth
C) Both A and B are equally effective
D) Neither A nor B
Answer:
You receive an e-mail that seems to come from a frequent customer. It contains specific
information about your relationship with the customer. Clicking on a link in the
message takes you to a website that seems to be your customer's website. However, the
website is fake. This is ________. (Pick the most precise answer.)
A) social engineering
B) a hoax
C) phishing
D) spear fishing
page-pff
Answer:
In federated identity management, firms ________.
A) query one another's identity management databases
B) send assertions to one another
C) Both A and B
D) Neither A nor B
Answer:
If a firewall receives a provable attack packet, the firewall will ________.
A) log the packet
B) drop the packet
C) Both A and B
D) Neither A nor B
Answer:
page-pf10
If two hosts are separated by seven networks, how many packets will there be along the
way when a host transmits a packet to another host?
A) 1
B) 2
C) 7
D) 14
Answer:
________ examines financial processes for efficiency, effectiveness, and adequate
controls.
A) Internal auditing
B) Financial auditing
C) IT auditing
D) None of the above
Answer:
Past judicial precedents constitute ________.
A) case law
page-pf11
B) statutes
C) criminal law
D) All of the above
Answer:
Terrorists can use IT to ________.
A) destroy utilities
B) finance their terrorism
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is one of the four bases for authentication credentials?
A) What you know
B) What you have
C) Both A and B
D) Neither A nor B
page-pf12
Answer:
Which of the following are examples of social engineering?
A) Wearing a uniform to give the appearance that you work at a business
B) Gaining unauthorized access by following an authorized individual in to a business
C) None of the above
D) All of the above
Answer:
Most packets are part of the ________ state.
A) connection opening
B) connection closing
C) Both A and B
D) Neither A nor B
Answer:
page-pf13
A ________ is law dealing with information technology.
A) cyberlaw
B) Title 13
C) Title 17
D) All of the above
Answer:
Using both a firewall and host hardening to protect a host is ________.
A) defense in depth
B) risk acceptance
C) an anti-weakest link strategy
D) adding berms
Answer:
________ can be much shorter than ________.
A) PINs, passwords
B) Passwords, PINs
page-pf14
C) There is no general length difference between passwords and PINs.
D) None of the above
Answer:
A ________ port number designates a specific application running on a server.
A) well-known
B) ephemeral
C) Both A and B
D) Neither A nor B
Answer:
The manager of the security department often is called ________.
A) the chief security officer (CSO)
B) the chief information security officer (CISO)
C) Either A and B
D) Neither A nor B
page-pf15
Answer:
Authorizations are also called ________.
A) permissions
B) verifications
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is a function of IDSs?
A) Strike-back
B) Automated analysis
C) Both A and B
D) Neither A nor B
Answer:
page-pf16
________ threaten to do at least temporary harm to the victim company's IT
infrastructure unless the victim pays the attacker.
A) Extortionists
B) Fraudsters
C) Bluffers
D) DoSers
Answer:
ICMP ________.
A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
Answer:
________ drop packets.
A) IDSs
B) IPSs
page-pf17
C) Both A and B
D) Neither A nor B
Answer:
________ is the plan-based creation and operation of countermeasures.
A) Planning
B) Protection
C) Response
D) All of the above
Answer:
________ audits are done by an organization on itself.
A) Internal
B) External
C) Both A and B
D) Neither A nor B
page-pf18
Answer:
This book focuses on ________.
A) offense
B) defense
C) offense and defense about equally
D) None of the above
Answer:
Which of the following uses a PKI?
A) S/MIME
B) PGP
C) Both A and B
D) Neither A nor B
Answer:
page-pf19
Rehearsals improve ________.
A) accuracy
B) speed
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is not one of the three levels of U.S. federal courts?
A) U.S. District Courts
B) U.S. Circuit Courts of Appeal
C) U.S. State Courts
D) The U.S. Supreme Court
Answer:
In Kerberos, the ________ is the supplicant's proof that it has already authenticated
itself with the Kerberos Server.
A) ticket granting ticket
B) service ticket
page-pf1a
C) Both A and B
D) Neither A nor B
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.