Question: Port scanning allows a hacker to__________________ A. known users passwords B. disrupt legitimate use of a system C. detect a systems vulnerabilities D. modify a

Port scanning allows a hacker to__________________

A. known users passwords

B. disrupt legitimate use of a system

C. detect a systems vulnerabilities

D. modify a transmission between a remote user and a system

Vulnerability scans can check:

A. unexpected long-running processes

B. hidden network daemons

C. unauthorized programs in system directories

D. all of the above

Trojan mule is a type of the Trojan horse which emulates ____________

A. a legitimate email

B. a system shell

C. a login program

D. a legitimate webpage

IPSec uses ______ encryption.

A. asymmetric

B. symmetric

C. one-time password

D. Caesar cipher User authentication can be based on_______________

A. the users possession of something

B. the users knowledge of something

C. an attribute of the user

D. all of the above

_______ is a type of social-engineering attack, in which a legitimate-looking e-mail misleads a user into entering confidential information.

A. spamming

B. phishing

C. attack surface

D. denial-of-service

TLS provides security at the _______ layer.

A. network

B. transport

C. application

D. none of the above Using a firewall, the following connection is allowed:

A. from Internet to companys computers

B. from Internet to DMZ (demilitarized zone)

C. from computers in DMZ (demilitarized zone) to company computers

D. none of the above IPSs (Intrusion Prevention Systems) can detect zero-day attack if they employ_____________

A. signature-based detection

B. anomaly detection

C. all of the above

D. none of the above _______________ encrypts the information on the target computer and renders it inaccessible to the owner

A. Spyware

B. Ransomware

C. Logic bomb

D. all of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!