Question: 1) While using which type of networking device would each host 'see' all other traffic on the network? A) network router B) token ring network

1) While using which type of networking device would each host 'see' all other traffic on the network?

A) network router

B) token ring network

C) network hub

D) network switch

2) Which concept of cryptography is used to make the ciphertext look significantly different than the plaintext after encryption?

A) Diffusion

B) Obfuscation

C) Collision

D) Confusion

3) Which of the following is the primary risk from using outdated software?

A) It may not have all the features you need.

B) It may not have the most modern security features.

C) It may no longer be supported by the vendor.

D) It may be easier to break into than newer software.

4) An attacker sent multiple broadcast messages to the network routers, spoofing an IP address of one of the network servers. This caused the network to send a flood of packets to that server and it is no longer responding. What best describes this attack?

A) DDoS attack

B) TCP SYN flood attack

C) Smurf Attack

D) TCP hijacking attack

5) A network admin has noticed that several machines on her network are infected with malware that is sending a flood of packets to a target external to the network. What best describes this attack?

A) Backdoor

B) SYN Flood

C) DDoS

D) Botnet

6) A company is developing a new technology that is expected to become a huge success. The CSO is concerned about someone stealing the secrets related to this technology. Which of the following will help the CSO identify potential dangers related to the loss of this technology?

A) Vulnerability assessment

B) Privacy threshold assessment

C) Threat assessment

D) Privacy impact assessment

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!