Question: Network speeds usually are measured in ________. bytes per second bits per second both A and B neither A nor B A specific encryption method

Network speeds usually are measured in ________.

bytes per second

bits per second

both A and B

neither A nor B

A specific encryption method is called a ________.

code

key method

schema

cipher

How long are IPv4 addresses in octets?

128 octets

48 octets

4 octets

32 octets

In a four-step close, which side transmits a FIN segment?

the side that initiates the close

the other side

either side

neither side

NGFWs ________.

can detect threats that span multiple packets

can implement different rules for different applications

both A and B

neither A nor B

For Netflix, ________ is a(n) ________, and ________ is a(n) ________.

Google, SaaS, AWS, SaaS

Google, SaaS, AWS, IaaS

Google, IaaS, AWS, IaaS

Google, IaaS, AWS, SaaS

An individual switch knows the frame's entire ________.

session

data link

route

none of the above

________ are full programs.

Viruses

Worms

both A and B

neither A nor B

________ is the dominant firewall filtering method used on main border firewalls today.

Application content filtering

Stateful packet inspection

ACL filtering

none of the above

Stateful firewalls are attractive because of their ________.

low cost

QoS guarantees

ability to filter complex application content

high filtering sophistication

Malware programs that masquerade as system files are called ________.

Trojan horses

viruses

scripts

payloads

The password "velociraptor" can be defeated most quickly by a ________.

dictionary attack

reverse engineering attack

brute-force attack

None of the above because it is more than 8 characters long.

Electronic signatures also provide ________ in addition to authentication.

message integrity

message encryption

both A and B

neither A nor B

Which of the following probably suffered the most financial damage from the Target breach?

consumers

POS vendors

banks

Target

In digital certificate authentication, the verifier gets the key it needs directly from the ________.

supplicant

true party

verifier

certificate authority

When messages of different users share a transmission line, this is ________.

parallel transmission

packetization

fragmentation

multiplexing

Which of the following sometimes uses direct propagation between computers?

Trojan horses

viruses

worms

downloaders

In digital certificate authentication, the verifier uses ________.

the supplicant's public key

the true party's public key

both A and B

neither A nor B

A message always has a ________.

data field

header

both A and B

neither A nor B

Which of the following tends to be more damaging to the victim?

credit card theft

identity theft

Both are about equally damaging to the victim.

Neither is damaging to the victim.

When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall ________.

passes the packet

does not approve the connection

drops the packet

opens a new connection

f you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?

Yes

No

We cannot say from the information given.

Unsolicited commercial e-mail is better known as ________.

adware

social engineering

spam

identity theft

In symmetric key encryption, a key must be ________ bits long, or longer, to be considered strong. (Choose the choice closest to the correct answer.)

128

64

36

56

Users typically can eliminate a vulnerability in one of their programs by ________.

doing a zero-day installation

installing a patch

using an antivirus program

all of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!