COSC 82213

subject Type Homework Help
subject Pages 17
subject Words 1751
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Another name for data is raw facts.
Answer:
SPI filtering for packets that are part of ongoing communications is usually simple.
Answer:
DoS attacks against VoIP can be successful even if they increase latency only slightly.
Answer:
Training users what not to put into e-mail messages is the most effective method of
avoiding problems during the legal discovery process.
Answer:
page-pf2
Employees usually must rationalize bad behavior.
Answer:
Signaling does not consist of communication to manage the network.
Answer:
CTS frames tell other clients that you have received a RTS frame.
Answer:
Attackers can read signals traveling over UTP without tapping the cord.
page-pf3
Answer:
From a legal standpoint, loss of encrypted data comes with negligible risk from the loss
private information.
Answer:
The hash size in MD-5 is 160 bits.
Answer:
To do TCP session hijacking, the attacker has to be able to predict the sequence number
of the TCP segment currently being sent.
Answer:
page-pf4
Most companies conduct full backups on a daily basis.
Answer:
The basic strategy of log file reading is to determine what traffic is usual.
Answer:
WEP mandates shared keys.
Answer:
In ingress filtering, the firewall examines packets entering the network from the
outside, typically from the Internet.
Answer:
page-pf5
In Kerberos, the Kerberos server sends the Service Ticket directly to the supplicant
rather than directly to the verifier.
Answer:
Systems administrators generally do not manage the network.
Answer:
One problem with ARP requests and replies is that they do not require authentication of
verification.
Answer:
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a
single ICMP request is responded to by multiple hosts.
page-pf6
Answer:
The last egress ACL rule in a border firewall is DENY ALL.
Answer:
Properly hardened hosts and securely coded applications can help protect data while it
is transmitted.
Answer:
Once an attack has begun, a company should never allow the attacker to continue.
Answer:
page-pf7
Like the public switched telephone network, VoIP technology is a closed system.
Answer:
Most databases are relational databases.
Answer:
Once established, botnets can be leased to other criminals for DoS attacks.
Answer:
MS-CHAP provides mutual authentication.
Answer:
page-pf8
In public key encryption for authentication, the receiver decrypts with the public key of
the sender.
Answer:
It generally is a good idea from a security point of view to upgrade to a new version of
an operating system.
Answer:
Firewall port openings are required for SIP/H.323 messages.
Answer:
CTS frames tell other wireless clients that you want to transmit for a given amount of
page-pf9
time.
Answer:
SYN-ACK can be best described as the second part of a three-way TCP handshake sent
in response to a SYN.
Answer:
The first task in security is to understand the environment to be protected.
Answer:
The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.
Answer:
page-pfa
The definition of spam is "unsolicited commercial e-mail."
Answer:
In normal ARP traffic, generally an attacker on the same network cannot see traffic
between two hosts.
Answer:
In a replay attack, the attacker cannot read the contents of the replayed message.
Answer:
Live tests are ________.
A) more effective than walkthroughs
page-pfb
B) inexpensive
C) Both A and B
D) Neither A nor B
Answer:
A residential access router usually contains ________.
A) a DHCP server
B) an Ethernet switch
C) Both A and B
D) Neither A nor B
Answer:
Nonces can be used in ________.
A) all applications
B) client/server applications
C) time-insensitive applications
D) persistent applications
page-pfc
Answer:
Packaged sets of cryptographic countermeasures for protecting data transmission are
________.
A) cryptographic standards
B) metacryptographic systems
C) cryptographic systems
D) All of the above
Answer:
In CobiT, entry must be ________.
A) justified
B) logged
C) Both A and B
D) Neither A nor B
Answer:
page-pfd
A NIDS can ________.
A) see all packets passing through its position in a network
B) scan encrypted data
C) Both A and B
D) Neither A nor B
Answer:
WLAN DoS attacks are designed to affect the ________ of the network.
A) confidentiality
B) integrity
C) availability
D) authentication
Answer:
What information should alarms give the security staff?
A) A way to test the alarm for accuracy
B) Advice about what the security administrator should do
page-pfe
C) Both A and B
D) Neither A nor B
Answer:
A benefit of using MSSPs is that they provide ________.
A) cost savings
B) independence
C) Both A and B
D) Neither A nor B
Answer:
Restoration of data files from tape ________.
A) is the fastest recovery method
B) always results in data loss
C) Both A and B
D) Neither A nor B
page-pff
Answer:
A program that gives the attacker remote access control of your computer is specifically
called a ________.
A) Trojan horse
B) spyware program
C) cookie
D) RAT
Answer:
Who should head the CSIRT?
A) IT
B) IT security
C) A senior manager
D) None of the above
Answer:
page-pf10
The 56-bit key size ________.
A) is sufficient for major business transactions
B) is sufficient for most residential consumer applications
C) is considered a strong length
D) All of the above
Answer:
________ are payments made by a supplier to a corporate buyer when a purchase is
made.
A) Bribes
B) Kickbacks
C) Both A and B
D) Neither A nor B
Answer:
A digital ________, by itself, provides authentication.
A) signature
B) certificate
page-pf11
C) Both A and B
D) Neither A nor B
Answer:
The name of the Internet standards architecture is ________.
A) OSI
B) ISO
C) TCP/IP
D) All of the above.
Answer:
Properly backed up data includes ________.
A) ensuring that copies of data files are stored safely and secured
B) ensuring that copies of data files will survive even if the data on the host are lost and
damaged
C) Both A and B
D) Neither A nor B
page-pf12
Answer:
An unauthorized access point set up by individuals or departments is called a(n)
________ access point.
A) rogue
B) evil twin
C) Both A and B
D) Neither A nor B
Answer:
________ is an example of PII.
A) Individual database names
B) Social Security number
C) Process run to backup servers
D) None of the above
Answer:
page-pf13
________ firewalls filter traffic passing between different parts of a site's network.
A) Border
B) Internal
C) Intermediate
D) None of the above
Answer:
What mistake did the 802.11i Working Group make when creating IVs?
A) Transmitting IVs in the clear
B) Making the IV too short
C) Both A and B
D) Neither A nor B
Answer:
The ________ layer in the hybrid TCP/IP-OSI architecture comes from OSI.
A) physical
B) transport
C) Both A and B
page-pf14
D) Neither A nor B
Answer:
What is the SPI firewall rule for packets that do not attempt to open connections?
A) Drop the packet unless it is permitted by an ACL
B) Pass the packet unless it is forbidden by an ACL
C) Pass the packet if it is part of a previously approved connection
D) Either A or B
Answer:
To be strong, ________ keys need to be longer than ________ keys.
A) public, symmetric
B) symmetric, public
C) Public and symmetric keys of about the same length have about equal strength.
D) None of the above
page-pf15
Answer:
Which of the following statements is true about log files?
A) Log files should be read regularly.
B) External auditing should be conducted periodically.
C) Automatic alerts should be established.
D) All of the above
Answer:
Two computer systems each back up the other in real time in ________.
A) CDP
B) full duplex backup
C) full backup
D) All of the above
Answer:
page-pf16
Which of the following is the most effective alternative for disaster recovery backup?
A) Hot sites
B) Cold sites
C) CDP
D) All of the above
Answer:
18 U.S.C. 1030 protects ________.
A) all computers
B) "protected computers" such as government computers
C) Both A and B
D) Neither A nor B
Answer:
To how many accounts and groups can different permissions be applied in Windows?
A) 3
B) 6
C) 100
page-pf17
D) almost an unlimited number
Answer:
________ is possible today.
A) Single sign-on
B) Reduced sign-on
C) Both A and B
D) Neither A nor B
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.