Question: 1 The higher-layer protocols defined as part of SSL include: a. handshake protocol b. change cipher spec protocol c. alert protocol d. all of the

1 The higher-layer protocols defined as part of SSL include:

a. handshake protocol

b. change cipher spec protocol

c. alert protocol

d. all of the above

2 A stateful inspection firewall ________.

a. applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet

b. controls TCP traffic by creating a directory of outbound TCP connections

c. acts as a relay of application-level traffic

d. sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host

3.__________ capture keystrokes on a compromised system.

a. Worms

b. Zombies

c. Keyloggers

d. All of the above

4.The ideal solution to the threat of viruses is:

a. detection

b. prevention

c. identification

d. removal

5.Which of the following is not an example of intrusion:

a. guessing and cracking passwords

b. running a packet sniffer on a workstation to capture user names and passwords

c. using an unattended, logged-in workstation without permission

d. all of the above are examples of intrusion

6.Which of the following statements regarding macro viruses is true?

a. a macro virus is platform independent

b. macro viruses infect documents, not executable portions of code

7

The network vehicle used for worm propagation is ___________.

Select one:

a. electronic mail facility

b. remote execution capability

c. remote login capability

d. all of the above

8

At _________ the IP header is exposed and so filtering or firewalls can be applied to IP addresses.

Select one:

a. layer 1

b. layer 2

c. layer 3

d. layer 4

9

The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

Select one:

a. active attacks

b. passive attacks

c. administrative attacks

d. none of the above

10.

Which of the following is a higher-layer protocol defined as part of SSL?

Select one:

a. the Handshake Protocol

b. the Change Cipher Spec Protocol

c. macro viruses are easily spread

d. all of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!