Question: SSL/TLS is used for ________. any application Web applications both A and B neither A nor B Small malware programs that download larger malware programs

SSL/TLS is used for ________.

any application

Web applications

both A and B

neither A nor B

Small malware programs that download larger malware programs are called ________.

scouts

downloaders

foothold programs

stage-one programs

Single network addresses in different single networks are ________.

unique if the two single networks use the same technology standard

unique

both A and B

neither A nor B

Converting application messages into bits is called ________.

encoding

encryption

exchange

encapsulation

Guarantees by a provider to meet certain delivery quality specifications are called ________.

speed quality guarantees

service warranties

service level agreements

contracts

Advanced persistent threats are ________.

extremely dangerous for the victim

inexpensive for the attacker

both A and B

neither A nor B

In antivirus filtering, the best ways to filter currently use ________.

stateful inspection

behavioral detection

signature detection

application awareness

The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

spyware

anti-privacy software

keystroke loggers

data mining software

Firewall log files should be read ________.

every week

every day

every month

usually only when a serious attack is suspected

When a firewall identifies an attack packet, it ________.

discards the packet

copies information about the packet into a log file

both A and B

neither A nor B

Who are the most dangerous types of employees?

IT security employees

former employees

financial employees

manufacturing employees

In authentication, the ________ is the party trying to prove his or her identity.

true party

verifier

supplicant

all of the above

In a firewall, VPN traversal ________.

increases the effectiveness of firewall filtering

reduces firewall filtering effectiveness

both A and B

neither A nor B

Which of the following can spread more rapidly?

directly-propagating viruses

directly-propagating worms

Both of the above can spread with approximately equal speed.

The UDP ________.

has a checksum field

is unreliable

both A and B

neither A nor B

An IaaS provides ________.

application programs

servers

both A and B

neither A nor B

Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.

SYN

ACK

SYN/ACK

none of the above

Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)

Trojan horses

worms

viruses

bots

What type of attacker are most of attackers today?

disgruntled employees and ex-employees

cyberterrorists

career criminals

hackers motivated by a sense of power

802.11 data link layer standards govern ________.

access point operation

frame organization

both A and B

neither A nor B

Credit card number thieves are called ________. (Pick the most precise answer.)

identity thieves

numbers racketeers

fraudsters

carders

Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________.

authentication

confidentiality

both A and B

neither A nor B

________ look at ________, and ________ look at ________.

Antivirus programs, packets, firewalls, files

Antivirus programs, packets, firewalls, packets

Antivirus programs, files, firewalls, packets

Antivirus programs, files, firewalls, files

Iris scanning is attractive because of its ________.

precision

low cost

both A and B

neither A nor B

The source socket is 60.171.18.22:57707. The source is a(n) ________.

ephemeral server

well-known server

server

client

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!