SSL/TLS is used for ________.

any application

Web applications

both A and B

neither A nor B

Small malware programs that download larger malware programs are called ________.

scouts

downloaders

foothold programs

stage-one programs

Single network addresses in different single networks are ________.

unique if the two single networks use the same technology standard

unique

both A and B

neither A nor B

Converting application messages into bits is called ________.

encoding

encryption

exchange

encapsulation

Guarantees by a provider to meet certain delivery quality specifications are called ________.

speed quality guarantees

service warranties

service level agreements

contracts

Advanced persistent threats are ________.

extremely dangerous for the victim

inexpensive for the attacker

both A and B

neither A nor B

In antivirus filtering, the best ways to filter currently use ________.

stateful inspection

behavioral detection

signature detection

application awareness

The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

spyware

anti-privacy software

keystroke loggers

data mining software

Firewall log files should be read ________.

every week

every day

every month

usually only when a serious attack is suspected

When a firewall identifies an attack packet, it ________.

discards the packet

copies information about the packet into a log file

both A and B

neither A nor B

Who are the most dangerous types of employees?

IT security employees

former employees

financial employees

manufacturing employees

In authentication, the ________ is the party trying to prove his or her identity.

true party

verifier

supplicant

all of the above

In a firewall, VPN traversal ________.

increases the effectiveness of firewall filtering

reduces firewall filtering effectiveness

both A and B

neither A nor B

Which of the following can spread more rapidly?

directly-propagating viruses

directly-propagating worms

Both of the above can spread with approximately equal speed.

The UDP ________.

has a checksum field

is unreliable

both A and B

neither A nor B

An IaaS provides ________.

application programs

servers

both A and B

neither A nor B

Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.

SYN

ACK

SYN/ACK

none of the above

Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)

Trojan horses

worms

viruses

bots

What type of attacker are most of attackers today?

disgruntled employees and ex-employees

cyberterrorists

career criminals

hackers motivated by a sense of power

802.11 data link layer standards govern ________.

access point operation

frame organization

both A and B

neither A nor B

Credit card number thieves are called ________. (Pick the most precise answer.)

identity thieves

numbers racketeers

fraudsters

carders

Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________.

authentication

confidentiality

both A and B

neither A nor B

________ look at ________, and ________ look at ________.

Antivirus programs, packets, firewalls, files

Antivirus programs, packets, firewalls, packets

Antivirus programs, files, firewalls, packets

Antivirus programs, files, firewalls, files

Iris scanning is attractive because of its ________.

precision

low cost

both A and B

neither A nor B

The source socket is 60.171.18.22:57707. The source is a(n) ________.

ephemeral server

well-known server

server

client

Respuesta :

Answer:

1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications

2.Small malware programs that download larger malware programs are called downloaders

3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards

4. Converting application messages into bits is called encoding

5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements

6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim

7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION

8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE

9. Firewall log files should be read EVERYDAY

10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file

11. IT security employees are the most difficult employees

12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.

13. In a firewall, VPN traversal reduces firewall filtering effectiveness

14. DIRECTLY-PROPAGATING WORM can spread more rapidly

15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.

16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.

17. 802.11 data link layer standards govern neither access point operation nor frame organization

18. Credit card number thieves are called CARDERS

19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY

20. Iris scanning is attractive because of its PRECISION

21. The source socket is 60.171.18.22:57707. The source is a CLIENT

ACCESS MORE
EDU ACCESS