MPCS 89270

subject Type Homework Help
subject Pages 9
subject Words 1039
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A network administrator notices extensive damage to wireless packets. This might
indicate a ________ attack.
A) man-in-the-middle
B) SYN/ACK
C) DoS flood attack
D) None of the above
Answer:
Regarding retention policies, firms need to ________.
A) implement strong and clear backup policies
B) specify how long data will be retained
C) ensure implementation is compliant with policies through periodic audits
D) All of the above
Answer:
Which of the following is not a standard Windows privilege?
A) Modify
B) All
page-pf2
C) Read & execute
D) List folder contents
Answer:
When a threat succeeds in causing harm to a business, this is a(n) ________.
A) breach
B) countermeasure
C) Both A and B
D) Neither A nor B
Answer:
Which of the following should the CSIRT include?
A) senior manager
B) PR director
C) firm's legal counsel
D) All of the above
page-pf3
Answer:
Microsoft's server operating system is called ________.
A) UNIX
B) Windows Server
C) Both A and B
D) Neither A nor B
Answer:
Which types of VPNs use VPN gateways?
A) Host-to-host VPNs
B) Remote access VPNs
C) Both A and B
D) Neither A nor B
Answer:
page-pf4
A DES key is ________ bits long.
A) 40
B) 56
C) 100
D) 128
Answer:
Quantum key cracking ________.
A) is a way to deliver enormously long keys to communication partners
B) creates a major threat to many traditional cryptographic methods
C) Both A and B
D) Neither A nor B
Answer:
If a firewall lacks the processing power to handle incoming traffic, it will drop any
packets it cannot process. This is ________.
A) a security failure
B) failing safely
page-pf5
C) Both A and B
D) Neither A nor B
Answer:
Which of the following are elements of host hardening?
A) Minimizing applications on the host
B) Having a good border firewall
C) Both A and B
D) Neither A nor B
Answer:
Whisker is a popular tool for ________.
A) reading website error logs
B) providing a webserver proxy in front of the webserver
C) conducting vulnerability testing on webservers
D) All of the above
page-pf6
Answer:
Compared to full programming languages, scripts are ________ in what they can do.
A) more limited
B) less limited
C) about as limited (but easier to use)
D) not limited at all
Answer:
________ specify the low-level detailed actions that must be taken by specific
employees.
A) Procedures
B) Processes
C) Both A and B
D) Neither A nor B
Answer:
page-pf7
What type of employee is the most dangerous when it comes to internal IT attacks?
A) Data entry clerks
B) Financial professionals
C) IT professionals
D) IT security professionals
Answer:
Policies drive ________.
A) implementation
B) oversight
C) Both A and B
D) Neither A nor B
Answer:
________ is the process of collecting information about the activities of each individual
in log files for immediate and later analysis.
A) Authorizations
B) Authentication
page-pf8
C) Accuracy
D) Auditing
Answer:
The stage of the plan-protect response cycle that consumes the most time is ________.
A) planning
B) protection
C) response
D) each of the above consumes about the same amount of time
Answer:
A(n) ________ attack attempts to make a server or network unavailable to serve
legitimate users by flooding it with attack packets.
A) virus
B) directly-propagating worm
C) DoS
D) bot
page-pf9
Answer:
Which of the following is an example of a conflict of interest?
A) Preferential dealings with relatives
B) Investing in competitors
C) Competing with the company while still employed by the company
D) All of the above
Answer:
When someone requests to take an action that is potentially dangerous, what protection
should be put into place?
A) Limit the number of people that may request an approval
B) Ensure that the approver is the same as the requestor
C) Both A and B
D) Neither A nor B
Answer:
page-pfa
The main advantage of IPv6 compared to IPv4 is ________.
A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.
Answer:
Wireless 802.11 networks generally have a range of ________.
A) 5 to 10 meters
B) 10 to 30 meters
C) 15 to 45 meters
D) None of the above
Answer:
NIDs look at ________.
A) all host traffic in a network
B) all network traffic in a network
C) Both A and B
page-pfb
D) Neither A nor B
Answer:
Directory servers can hold information about ________.
A) people
B) computers
C) Both A and B
D) Neither A nor B
Answer:
The cost of ________ LINUX is definitely far less than the cost of commercial
operating systems such as Windows.
A) purchasing
B) using
C) Both A and B
D) Neither A nor B
page-pfc
Answer:
The super user account has ________ control over the computer.
A) total or nearly total
B) substantial but not nearly total
C) little
D) no
Answer:
An abrupt TCP close takes ________ segments.
A) 2
B) 3
C) 4
D) None of the above.
Answer:
page-pfd
Which of the following is the most dangerous because it can do more on a computer
when it is executed?
A) Active-X
B) Java
C) Javascript
D) VBscript
Answer:
________ is a password-cracking method wherein the attacker tries all possible
passwords, starting with single-character passwords.
A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.