MPCS 87880

subject Type Homework Help
subject Pages 9
subject Words 968
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In order to be considered strong today, a symmetric encryption key must be at least
________ bits long.
A) 6
B) 8
C) 100
D) 1,000
Answer:
Integrated log files ________.
A) tend to have problems with format incompatibilities
B) tend to have time synchronization problems
C) Both A and B
D) Neither A nor B
Answer:
In a firm, codes of ethics apply to ________.
A) part-time employees
B) senior managers
page-pf2
C) Both A and B
D) Neither A nor B
Answer:
The normal standard for deciding a case in ________ trials is guilt beyond a reasonable
doubt.
A) civil
B) criminal
C) Both A and B
D) Neither A nor B
Answer:
Testers have permissions on the ________.
A) development server
B) testing server
C) production server
D) Both A and B
page-pf3
Answer:
Watching someone type their password in order to learn the password is called
________.
A) piggybacking
B) shoulder surfing
C) Both A and B
D) Neither A nor B
Answer:
Security problems with protocols include ________.
A) a lack of security in earlier versions
B) awkwardly added security
C) Both A and B
D) Neither A nor B
Answer:
page-pf4
Disconnection ________.
A) is the most decisive way to do termination
B) harms legitimate users
C) Both A and B
D) Neither A nor B
Answer:
A computer connects to the nearest switch via a ________.
A) physical link
B) data link
C) Both A and B
D) Neither A nor B
Answer:
An EAP response message may contain ________.
A) a request for a different authentication mechanism
B) a negative acknowledgement
C) Both A and B
page-pf5
D) Neither A nor B
Answer:
Which of the following is true?
A) TCP works at the transport layer.
B) UDP works at the transport layer.
C) Both A and B
D) Neither A nor B
Answer:
________ may engage in commercial espionage against a firm.
A) Competitors
B) National governments
C) Both A and B
D) Neither A nor B
page-pf6
Answer:
For computer access, a false ________ means that a legitimate user is denied access to
a resource.
A) rejection
B) acceptance
C) Both A and B
D) Neither A nor B
Answer:
________ deals with interpretations of rights and duties that companies or individuals
have relative to each other.
A) Criminal law
B) Civil law
C) Both A and B
D) Neither A nor B
Answer:
page-pf7
Which type of program can hide itself from normal inspection and detection?
A) Trojan horse
B) Stealth Trojan
C) Spyware
D) Rootkit
Answer:
A ________ attack is when a webserver is flooded with application layer web requests.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Answer:
________ means responding to risk by taking out insurance.
A) Risk reduction
B) Risk acceptance
C) Risk avoidance
page-pf8
D) Risk transference
Answer:
Replication between a domain controller in a child domain and a domain controller in
its parent domain is ________.
A) total
B) partial
C) nonexistent
D) intransitive
Answer:
________ offers no security at all.
A) SNMP V1
B) SNMP V2
C) SNMP V3
D) All of the above offer security.
page-pf9
Answer:
Firewalls will drop ________.
A) suspicious packets
B) provable attack packets
C) Both A and B
D) Neither A nor B
Answer:
________ specifically addresses data protection requirements at health care institutions.
A) GLBA
B) HIPAA
C) Sarbanes-Oxley
D) The SEC Act
Answer:
page-pfa
E-mail filtering can be done at which of the following?
A) The user's PC
B) The corporate e-mail servers
C) E-mail managed service providers
D) All of the above
Answer:
Which type of analysis do IDSs usually do?
A) Attack signature detection
B) Anomaly detection
C) Both A and B
D) Neither A nor B
Answer:
In regards to network security, ________ is the policy-driven control of access to
systems, data, and dialogues.
A) confidentiality
B) integrity
page-pfb
C) access control
D) availability
Answer:
To find out who is sending trade secrets out of the firm, you can use ________.
A) DRM
B) data extrusion management
C) watermarking
D) None of the above
Answer:
________ detection looks for specific patterns in the network traffic to identify a threat.
A) Signature
B) Anomaly
C) Both A and B
D) Neither A nor B
page-pfc
Answer:
The standard for sending security assertions is ________.
A) LDAP
B) XML
C) SAML
D) None of the above
Answer:
What type of filtering do IDSs do?
A) Deep packet inspection
B) SPI filtering
C) Both A and B
D) Neither A nor B
Answer:
page-pfd
The sender the uses public key of the recipient in ________.
A) public key encryption for confidentiality
B) public key encryption for authentication
C) Both A and B
D) Neither A nor B
Answer:
Hot sites ________.
A) are more expensive than CDP
B) Lose less data during a disaster than CDP
C) Both A and B
D) Neither A nor B
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.