Question: Network speeds usually are measured in ________. bytes per second bits per second both A and B neither A nor B A specific encryption method
Network speeds usually are measured in ________.
| bytes per second | ||
| bits per second | ||
| both A and B | ||
| neither A nor B |
A specific encryption method is called a ________.
| code | ||
| key method | ||
| schema | ||
| cipher |
How long are IPv4 addresses in octets?
| 128 octets | ||
| 48 octets | ||
| 4 octets | ||
| 32 octets |
In a four-step close, which side transmits a FIN segment?
| the side that initiates the close | ||
| the other side | ||
| either side | ||
| neither side |
NGFWs ________.
| can detect threats that span multiple packets | ||
| can implement different rules for different applications | ||
| both A and B | ||
| neither A nor B |
For Netflix, ________ is a(n) ________, and ________ is a(n) ________.
| Google, SaaS, AWS, SaaS | ||
| Google, SaaS, AWS, IaaS | ||
| Google, IaaS, AWS, IaaS | ||
| Google, IaaS, AWS, SaaS |
An individual switch knows the frame's entire ________.
| session | ||
| data link | ||
| route | ||
| none of the above |
________ are full programs.
| Viruses | ||
| Worms | ||
| both A and B | ||
| neither A nor B |
________ is the dominant firewall filtering method used on main border firewalls today.
| Application content filtering | ||
| Stateful packet inspection | ||
| ACL filtering | ||
| none of the above |
Stateful firewalls are attractive because of their ________.
| low cost | ||
| QoS guarantees | ||
| ability to filter complex application content | ||
| high filtering sophistication |
Malware programs that masquerade as system files are called ________.
| Trojan horses | ||
| viruses | ||
| scripts | ||
| payloads |
The password "velociraptor" can be defeated most quickly by a ________.
| dictionary attack | ||
| reverse engineering attack | ||
| brute-force attack | ||
| None of the above because it is more than 8 characters long. |
Electronic signatures also provide ________ in addition to authentication.
| message integrity | ||
| message encryption | ||
| both A and B | ||
| neither A nor B |
Which of the following probably suffered the most financial damage from the Target breach?
| consumers | ||
| POS vendors | ||
| banks | ||
| Target |
In digital certificate authentication, the verifier gets the key it needs directly from the ________.
| supplicant | ||
| true party | ||
| verifier | ||
| certificate authority |
When messages of different users share a transmission line, this is ________.
| parallel transmission | ||
| packetization | ||
| fragmentation | ||
| multiplexing |
Which of the following sometimes uses direct propagation between computers?
| Trojan horses | ||
| viruses | ||
| worms | ||
| downloaders |
In digital certificate authentication, the verifier uses ________.
| the supplicant's public key | ||
| the true party's public key | ||
| both A and B | ||
| neither A nor B |
A message always has a ________.
| data field | ||
| header | ||
| both A and B | ||
| neither A nor B |
Which of the following tends to be more damaging to the victim?
| credit card theft | ||
| identity theft | ||
| Both are about equally damaging to the victim. | ||
| Neither is damaging to the victim. |
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall ________.
| passes the packet | ||
| does not approve the connection | ||
| drops the packet | ||
| opens a new connection |
f you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?
| Yes | ||
| No | ||
| We cannot say from the information given. |
Unsolicited commercial e-mail is better known as ________.
| adware | ||
| social engineering | ||
| spam | ||
| identity theft |
In symmetric key encryption, a key must be ________ bits long, or longer, to be considered strong. (Choose the choice closest to the correct answer.)
| 128 | ||
| 64 | ||
| 36 | ||
| 56 |
Users typically can eliminate a vulnerability in one of their programs by ________.
| doing a zero-day installation | ||
| installing a patch | ||
| using an antivirus program | ||
| all of the above |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
