A) scouts
B) probe packets
C) exploits
D) Mocking Jays
Correct Answer
verified
Multiple Choice
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B
Correct Answer
verified
Multiple Choice
A) dictionary attack
B) hybrid mode dictionary attack
C) brute force attack
D) All of the above could defeat the password equally quickly.
Correct Answer
verified
Multiple Choice
A) viruses
B) hackers
C) both A and B
D) neither A nor B
Correct Answer
verified
Multiple Choice
A) viruses
B) scripts
C) payloads
D) Trojan horses
Correct Answer
verified
Multiple Choice
A) do damage manually
B) delete log files
C) create a backdoor
D) download a hacker toolkit
Correct Answer
verified
Multiple Choice
A) 40
B) 56
C) 128
D) 1,024
Correct Answer
verified
Multiple Choice
A) e-mail
B) direct propagation
C) both A and B
D) neither A nor B
Correct Answer
verified
Multiple Choice
A) cost
B) susceptibility to deception
C) both A and B
D) neither A nor B
Correct Answer
verified
Multiple Choice
A) process it through the ACL
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
Correct Answer
verified
Multiple Choice
A) directly-propagating viruses
B) directly-propagating worms
C) Both of the above can spread with approximately equal speed.
Correct Answer
verified
Multiple Choice
A) high filtering sophistication
B) ability to filter complex application content
C) QoS guarantees
D) low cost
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
D) passes the packet, but notifies an administrator
Correct Answer
verified
Multiple Choice
A) have comprehensive security
B) have defense in depth
C) do risk analysis
D) only give minimum permissions
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) virus
B) worm
C) both A and B
D) neither A nor B
Correct Answer
verified
Multiple Choice
A) can only be broken by a brute force-attack
B) is sufficiently long
C) begins with a capital letter and ends with a digit (number)
D) none of the above
Correct Answer
verified
Multiple Choice
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B
Correct Answer
verified
Showing 21 - 40 of 152
Related Exams