Question: 1 The higher-layer protocols defined as part of SSL include: a. handshake protocol b. change cipher spec protocol c. alert protocol d. all of the
1 The higher-layer protocols defined as part of SSL include:
a. handshake protocol
b. change cipher spec protocol
c. alert protocol
d. all of the above
2 A stateful inspection firewall ________.
a. applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
b. controls TCP traffic by creating a directory of outbound TCP connections
c. acts as a relay of application-level traffic
d. sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host
3.__________ capture keystrokes on a compromised system.
a. Worms
b. Zombies
c. Keyloggers
d. All of the above
4.The ideal solution to the threat of viruses is:
a. detection
b. prevention
c. identification
d. removal
5.Which of the following is not an example of intrusion:
a. guessing and cracking passwords
b. running a packet sniffer on a workstation to capture user names and passwords
c. using an unattended, logged-in workstation without permission
d. all of the above are examples of intrusion
6.Which of the following statements regarding macro viruses is true?
a. a macro virus is platform independent
b. macro viruses infect documents, not executable portions of code
7
The network vehicle used for worm propagation is ___________.
Select one:
a. electronic mail facility
b. remote execution capability
c. remote login capability
d. all of the above
8
At _________ the IP header is exposed and so filtering or firewalls can be applied to IP addresses.
Select one:
a. layer 1
b. layer 2
c. layer 3
d. layer 4
9
The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.
Select one:
a. active attacks
b. passive attacks
c. administrative attacks
d. none of the above
10.
Which of the following is a higher-layer protocol defined as part of SSL?
Select one:
a. the Handshake Protocol
b. the Change Cipher Spec Protocol
c. macro viruses are easily spread
d. all of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
