Question: Port scanning allows a hacker to__________________ A. known users passwords B. disrupt legitimate use of a system C. detect a systems vulnerabilities D. modify a
Port scanning allows a hacker to__________________
A. known users passwords
B. disrupt legitimate use of a system
C. detect a systems vulnerabilities
D. modify a transmission between a remote user and a system
Vulnerability scans can check:
A. unexpected long-running processes
B. hidden network daemons
C. unauthorized programs in system directories
D. all of the above
Trojan mule is a type of the Trojan horse which emulates ____________
A. a legitimate email
B. a system shell
C. a login program
D. a legitimate webpage
IPSec uses ______ encryption.
A. asymmetric
B. symmetric
C. one-time password
D. Caesar cipher User authentication can be based on_______________
A. the users possession of something
B. the users knowledge of something
C. an attribute of the user
D. all of the above
_______ is a type of social-engineering attack, in which a legitimate-looking e-mail misleads a user into entering confidential information.
A. spamming
B. phishing
C. attack surface
D. denial-of-service
TLS provides security at the _______ layer.
A. network
B. transport
C. application
D. none of the above Using a firewall, the following connection is allowed:
A. from Internet to companys computers
B. from Internet to DMZ (demilitarized zone)
C. from computers in DMZ (demilitarized zone) to company computers
D. none of the above IPSs (Intrusion Prevention Systems) can detect zero-day attack if they employ_____________
A. signature-based detection
B. anomaly detection
C. all of the above
D. none of the above _______________ encrypts the information on the target computer and renders it inaccessible to the owner
A. Spyware
B. Ransomware
C. Logic bomb
D. all of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
