This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
When you use your mobile firm to surf the Internet, it is a host.
Answer:
EAP uses RADIUS for authentication.
Answer:
On a compromised computer, if you mistype the name of a URL, you may be taken to a
malicious website even if you set your browser security to high.
Answer:
Antivirus servers can only find viruses, not other types of malware.
Answer:
IDSs need to filter individual packets rather than packet streams.
Answer:
In cryptographic systems, keying takes place during the second handshaking stage.
Answer:
Most CAs are not regulated.
Answer:
Accepting cookies is necessary to use many websites.
Answer:
Skype's file transfer generally does not work with antivirus programs.
Answer:
IDSs drop packets that are merely suspicious.
Answer:
Employees often have extensive knowledge of systems and can pose a greater risk than
external attackers.
Answer:
In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The
servers then send all responses to the victim.
Answer:
The definition of hacking is "intentionally accessing a computer resource without
authorization or in excess of authorization."
Answer:
Security professionals should minimize burdens on functional departments.
Answer:
Skype can decrypt and read user traffic.
Answer:
In Internet Explorer, the Security tab controls the website's pop-up blocker.
Answer:
Spammers are one reason that some companies have outsourced e-mail filtering.
Answer:
In the IETF, a proposed standard is called a Request for Comments.
Answer:
In e-mail, the security standards situation is mature.
Answer:
The IP header checksum field is used for error detection.
Answer:
Main border firewalls rarely use stateful packet inspection.
Answer:
A company should consider list of possible remediation plans as an investment
portfolio.
Answer:
In Windows, a user's effective permissions are all those inherited from its parent
directory plus any specifically allowed permission, minus those denied.
Answer:
All unattended exits should be locked to bar exit.
Answer:
IDSs tend to issue many false negatives.
Answer:
Creating ACLs is the most time-consuming part of firewall management.
Answer:
Nearly all encryption for confidentiality uses symmetric key encryption ciphers.
Answer:
The main standards used by firms to send security assertions to one another is LDAP.
Answer:
The terms "intellectual property" and "trade secret" are synonymous.
Answer:
A company should not replace default passwords during configuration.
Answer:
With local backup processes, policies are easily enforced.
Answer:
When your home PC is on a network, it is a host.
Answer:
In fraud, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest.
Answer:
Black holing is an effective long-term containment solution.
Answer:
Placing sensitive equipment in secure areas to minimize potential threats and damage is
called siting.
Answer:
Having a permanent business continuity staff is necessary.
Answer:
DNS, DHCP, and LDAP are examples of supervisory protocols in TCP/IP.
Answer:
It is getting easier for attackers to bypass the border firewall.
Answer:
Firms can address the increasing ability of attackers to bypass the border firewalls by
________.
A) hardening hosts
B) having multiple border firewalls
C) Both A and B
D) Neither A nor B
Answer:
In ________, signals can be read without tapping the cord.
A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
Answer:
Mandatory vacations should be enforced ________.
A) to improve employee diligence to threats
B) to reduce the possibility of collusion between employees
C) to be in compliance with state and federal law
D) for ethical purposes
Answer:
Who should be involved in the creation of retention policies?
A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B
Answer:
The ultimate goal of a DoS attack is to ________.
A) cause harm
B) frustrate users
C) practice hacking
D) None of the above
Answer:
In Kerberos, the ________ is sent from the Kerberos server to the supplicant.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer:
18 U.S.C. 1030 prohibits ________.
A) hacking
B) malware attacks
C) denial-of-service attacks
D) All of the above
Answer:
Which IPS response to an attack is the most effective in stopping attacks?
A) Dropping packets
B) Limiting suspicious traffic to a certain percentage of the total bandwidth
C) Both A and B are equally effective
D) Neither A nor B
Answer:
You receive an e-mail that seems to come from a frequent customer. It contains specific
information about your relationship with the customer. Clicking on a link in the
message takes you to a website that seems to be your customer's website. However, the
website is fake. This is ________. (Pick the most precise answer.)
A) social engineering
B) a hoax
C) phishing
D) spear fishing
Answer:
In federated identity management, firms ________.
A) query one another's identity management databases
B) send assertions to one another
C) Both A and B
D) Neither A nor B
Answer:
If a firewall receives a provable attack packet, the firewall will ________.
A) log the packet
B) drop the packet
C) Both A and B
D) Neither A nor B
Answer:
If two hosts are separated by seven networks, how many packets will there be along the
way when a host transmits a packet to another host?
A) 1
B) 2
C) 7
D) 14
Answer:
________ examines financial processes for efficiency, effectiveness, and adequate
controls.
A) Internal auditing
B) Financial auditing
C) IT auditing
D) None of the above
Answer:
Past judicial precedents constitute ________.
A) case law
B) statutes
C) criminal law
D) All of the above
Answer:
Terrorists can use IT to ________.
A) destroy utilities
B) finance their terrorism
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is one of the four bases for authentication credentials?
A) What you know
B) What you have
C) Both A and B
D) Neither A nor B
Answer:
Which of the following are examples of social engineering?
A) Wearing a uniform to give the appearance that you work at a business
B) Gaining unauthorized access by following an authorized individual in to a business
C) None of the above
D) All of the above
Answer:
Most packets are part of the ________ state.
A) connection opening
B) connection closing
C) Both A and B
D) Neither A nor B
Answer:
A ________ is law dealing with information technology.
A) cyberlaw
B) Title 13
C) Title 17
D) All of the above
Answer:
Using both a firewall and host hardening to protect a host is ________.
A) defense in depth
B) risk acceptance
C) an anti-weakest link strategy
D) adding berms
Answer:
________ can be much shorter than ________.
A) PINs, passwords
B) Passwords, PINs
C) There is no general length difference between passwords and PINs.
D) None of the above
Answer:
A ________ port number designates a specific application running on a server.
A) well-known
B) ephemeral
C) Both A and B
D) Neither A nor B
Answer:
The manager of the security department often is called ________.
A) the chief security officer (CSO)
B) the chief information security officer (CISO)
C) Either A and B
D) Neither A nor B
Answer:
Authorizations are also called ________.
A) permissions
B) verifications
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is a function of IDSs?
A) Strike-back
B) Automated analysis
C) Both A and B
D) Neither A nor B
Answer:
________ threaten to do at least temporary harm to the victim company's IT
infrastructure unless the victim pays the attacker.
A) Extortionists
B) Fraudsters
C) Bluffers
D) DoSers
Answer:
ICMP ________.
A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
Answer:
________ drop packets.
A) IDSs
B) IPSs
C) Both A and B
D) Neither A nor B
Answer:
________ is the plan-based creation and operation of countermeasures.
A) Planning
B) Protection
C) Response
D) All of the above
Answer:
________ audits are done by an organization on itself.
A) Internal
B) External
C) Both A and B
D) Neither A nor B
Answer:
This book focuses on ________.
A) offense
B) defense
C) offense and defense about equally
D) None of the above
Answer:
Which of the following uses a PKI?
A) S/MIME
B) PGP
C) Both A and B
D) Neither A nor B
Answer:
Rehearsals improve ________.
A) accuracy
B) speed
C) Both A and B
D) Neither A nor B
Answer:
Which of the following is not one of the three levels of U.S. federal courts?
A) U.S. District Courts
B) U.S. Circuit Courts of Appeal
C) U.S. State Courts
D) The U.S. Supreme Court
Answer:
In Kerberos, the ________ is the supplicant's proof that it has already authenticated
itself with the Kerberos Server.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer:
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.