Question: Only choose the correct answer: 2. Adam is using a public computer at an internet caf to update personal information. Which of the following step(s)

Only choose the correct answer:

Only choose the correct answer: 2. Adam is using a public computerat an internet caf to update personal information. Which of the followingstep(s) can he take to ensure his privacy? A. Ensure no one

2. Adam is using a public computer at an internet caf to update personal information. Which of the following step(s) can he take to ensure his privacy? A. Ensure no one is shoulder surfing B. Bookmark the site for fast retrieval Erase the browser history when finished D. A and C 3. Jasman has recently discovered that all the files and folders on his laptop are encrypted. He is a victim of a ransomware attack. Which is the best way for Jasman to get access to his files? A. Pay for the decryption key Hire technical support to create decryption key C. Format, reinstall, and use backups D. Buy a new laptop 4. Tini is explaining basic security to a new technician. She is teaching him how to secure ports on any server or workstation. Which of the following can be rules about ports? A. Block all incoming ports. B. Block ICMP packets. C. Block all unused ports. D. Block all nonstandard ports. 5. You are trying to identify all potential denial of service (DoS) attack vectors. In doing so, you hope to provide mitigation for these attack vectors. What is the reason protecting against Trojan horse attacks can reduce Dos attacks? A. Many DoS attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack. B. If you can stop a Trojan horse attack, you will also stop DoS attacks. C. A Trojan horse will often open ports and thus allow DoS attacks. D. A Trojan horse has much the same effect as a DoS attack. 6. What is the most significant weakness in a denial of service (DoS) attack from the attacker's viewpoint? A. The attack is often unsuccessful. B. The attack is difficult to execute. C. The attack is easy to stop D. The attack must be sustained. 7. A range of countermeasures can help defend against denial of services (DoS) attacks. What are THREE (3) methods for protecting against SYN flood attacks? A. SYN cookies, RST cookies and stack tweaking B. SYN cookies, DoS cookies and stack tweaking C. DoS cookies, RST cookies and stack deletion D. Dos cookies, SYN cookies, and stack deletion 8. Which of the following is a disadvantage of using an application gateway firewall? A. It is not very secure. B. It uses a great deal of resources. C. It can be difficult to configure. D. It can only work on router-based firewalls

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!