Question: Please answer them ALL for me to understand 11.What technology has made trojans easy to distribute? Choose the best answer. Choice a EXE wrappers Choice

Please answer them ALL for me to understand

11.What technology has made trojans easy to distribute? Choose the best answer.

Choice a

EXE wrappers

Choice b

Digitally Signed Software

Choice c

Assembly language

Choice d

Personal firewall software

12. A disadvantage of single sign-on is:

Choice a

Repeated use of the same passwords.

Choice b

Consistent time-out enforcement across platforms.

Choice c

Forcing password changes on all subordinate systems.

Choice d

A compromised password exposes all authorized resources.

13. An IPsec security association includes ___

Choice a

the Diffie-Hellman key exchange crypto variable

Choice b

the IKE

Choice c

IP address of the distant end

Choice d

IP address of the originating computer

14. Which of the following tools would be most effective for sniffing RDP (Remote Desktop Connection) logins? (choose one.)

Choice a

Wireshark

Choice b

dsniff

Choice c

macof

Choice d

Cain and Abel

15. What is the purpose of a hash function?

Choice a

To provide integrity

Choice b

To create a value that cannot be repudiated by its sender

Choice c

To obfuscate a data segment such that it cannot be deciphered without a key

Choice d

To preserve a copy of all of the information from the original data segment

16. Which of the following is true regarding varying skill sets with regards to technical staff?

Choice a

Valuable employees should be focused on specialized functions and skill sets.

Choice b

The organization should ensure employees have overlapping skills when possible to prevent single points of failure

Choice c

Managerial skills (soft skills) should be prioritized over technical skills.

Choice d

Valuable IT employees need to possess the skill sets for any job in IT.

17. What sniffer program is capable of reconstructing associated TCP packets into a session showing application layer data from the client to the server and vice-versa?

Choice a

ARPwatch

Choice b

Packetyzer

Choice c

Etherape

Choice d

Wireshark

18. Methodology is one of the most important factors of success while doing a security test. Which of the following steps would represent the first step that is done either by a malicious cracker or a penetration tester?

Choice a

Scanning

Choice b

Enumeration

Choice c

Footprinting

Choice d

19. Which of the following types of attacks is the hardest to detect and prevent?

Choice a

Viruses that are hidden in exe's and attached to email

Choice b

DDoS attacks against web services

Choice c

Exploits against web applications such as SQL injection and buffer overflows

Choice d

Web pages with malicious executable content

20. Which of these terms is MOST closely related to integrity?

Choice a

Trustworthiness

Choice b

Auditability

Choice c

Reliability

Choice d

Need-to-know

21. A digital signature does NOT ___

Choice a

use asymmetric keys.

Choice b

provide non-repudiation of origin.

Choice c

provide confidentiality

Choice d

provide proof of integrity.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!