Question: SSL/TLS is used for ________. any application Web applications both A and B neither A nor B Small malware programs that download larger malware programs
SSL/TLS is used for ________.
| any application | ||
| Web applications | ||
| both A and B | ||
| neither A nor B |
Small malware programs that download larger malware programs are called ________.
| scouts | ||
| downloaders | ||
| foothold programs | ||
| stage-one programs |
Single network addresses in different single networks are ________.
| unique if the two single networks use the same technology standard | ||
| unique | ||
| both A and B | ||
| neither A nor B |
Converting application messages into bits is called ________.
| encoding | ||
| encryption | ||
| exchange | ||
| encapsulation |
Guarantees by a provider to meet certain delivery quality specifications are called ________.
| speed quality guarantees | ||
| service warranties | ||
| service level agreements | ||
| contracts |
Advanced persistent threats are ________.
| extremely dangerous for the victim | ||
| inexpensive for the attacker | ||
| both A and B | ||
| neither A nor B |
In antivirus filtering, the best ways to filter currently use ________.
| stateful inspection | ||
| behavioral detection | ||
| signature detection | ||
| application awareness |
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.
| spyware | ||
| anti-privacy software | ||
| keystroke loggers | ||
| data mining software |
Firewall log files should be read ________.
| every week | ||
| every day | ||
| every month | ||
| usually only when a serious attack is suspected |
When a firewall identifies an attack packet, it ________.
| discards the packet | ||
| copies information about the packet into a log file | ||
| both A and B | ||
| neither A nor B |
Who are the most dangerous types of employees?
| IT security employees | ||
| former employees | ||
| financial employees | ||
| manufacturing employees |
In authentication, the ________ is the party trying to prove his or her identity.
| true party | ||
| verifier | ||
| supplicant | ||
| all of the above |
In a firewall, VPN traversal ________.
| increases the effectiveness of firewall filtering | ||
| reduces firewall filtering effectiveness | ||
| both A and B | ||
| neither A nor B |
Which of the following can spread more rapidly?
| directly-propagating viruses | ||
| directly-propagating worms | ||
| Both of the above can spread with approximately equal speed. |
The UDP ________.
| has a checksum field | ||
| is unreliable | ||
| both A and B | ||
| neither A nor B |
An IaaS provides ________.
| application programs | ||
| servers | ||
| both A and B | ||
| neither A nor B |
Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.
| SYN | ||
| ACK | ||
| SYN/ACK | ||
| none of the above |
Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)
| Trojan horses | ||
| worms | ||
| viruses | ||
| bots |
What type of attacker are most of attackers today?
| disgruntled employees and ex-employees | ||
| cyberterrorists | ||
| career criminals | ||
| hackers motivated by a sense of power |
802.11 data link layer standards govern ________.
| access point operation | ||
| frame organization | ||
| both A and B | ||
| neither A nor B |
Credit card number thieves are called ________. (Pick the most precise answer.)
| identity thieves | ||
| numbers racketeers | ||
| fraudsters | ||
| carders |
Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________.
| authentication | ||
| confidentiality | ||
| both A and B | ||
| neither A nor B |
________ look at ________, and ________ look at ________.
| Antivirus programs, packets, firewalls, files | ||
| Antivirus programs, packets, firewalls, packets | ||
| Antivirus programs, files, firewalls, packets | ||
| Antivirus programs, files, firewalls, files |
Iris scanning is attractive because of its ________.
| precision | ||
| low cost | ||
| both A and B | ||
| neither A nor B |
The source socket is 60.171.18.22:57707. The source is a(n) ________.
| ephemeral server | ||
| well-known server | ||
| server | ||
| client |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
