Deck 3: Network Security

ملء الشاشة (f)
exit full mode
سؤال
Which of the following sometimes uses direct propagation between computers?

A)viruses
B)worms
C)Trojan horses
D)downloaders
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Mobile code is another name for ________.

A)virus
B)worm
C)both A and B
D)neither A nor B
سؤال
Small malware programs that download larger malware programs are called ________.

A)downloaders
B)scouts
C)foothold programs
D)stage-one programs
سؤال
The Target attackers probably first broke into Target using the credentials of a(n)________.

A)low-level Target employee
B)Target IT employee
C)Target security employee
D)employee in a firm outside Target
سؤال
Which of the following can spread more rapidly?

A)directly-propagating viruses
B)directly-propagating worms
C)Both of the above can spread with approximately equal speed.
سؤال
The general name for evil software is ________.

A)virus
B)worm
C)exploit
D)malware
سؤال
A program that can capture passwords as you enter them is ________.

A)a keystroke logger
B)data mining software
C)both A and B
D)neither A nor B
سؤال
The Target attackers sold their stolen card information to ________.

A)crimeware shops
B)card shops
C)card counterfeiters
D)Hallmark
سؤال
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

A)keystroke loggers
B)anti-privacy software
C)spyware
D)data mining software
سؤال
Vulnerability-based attacks that occur before a patch is available are called ________ attacks.

A)preinstallation
B)stealth
C)malware
D)zero-day
سؤال
Which of the following attach themselves to other programs?

A)Viruses
B)Worms
C)both A and B
D)neither A nor B
سؤال
The general name for a security flaw in a program is a ________.

A)virus
B)malware
C)security fault
D)vulnerability
سؤال
________ are full programs.

A)Viruses
B)Worms
C)both A and B
D)neither A nor B
سؤال
Malware programs that masquerade as system files are called ________.

A)viruses
B)scripts
C)payloads
D)Trojan horses
سؤال
Which of the following probably suffered the most financial damage from the Target breach?

A)retailers other than Target
B)banks
C)consumers
D)POS terminal vendors
سؤال
A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.

A)malware
B)security error
C)vulnerability
D)security fault
سؤال
Users typically can eliminate a vulnerability in one of their programs by ________.

A)installing a patch
B)doing a zero-day installation
C)using an antivirus program
D)all of the above
سؤال
Trojan horses can spread by ________.

A)e-mailing themselves to victim computers
B)directly propagating to victim computers
C)both A and B
D)neither A nor B
سؤال
Viruses most commonly spread from one computer to another ________.

A)via e-mail
B)by propagating directly by themselves
C)through obfuscation
D)all of the above
سؤال
Which of the following probably suffered the most financial damage from the Target breach?

A)Target
B)banks
C)consumers
D)POS vendors
سؤال
In distributed DoS attacks,the attacker sends messages directly to ________.

A)bots
B)the intended victim of the DoS attack
C)a command and control server
D)DOS servers
سؤال
Pieces of code that are executed after the virus or worm has spread are called ________.

A)vulnerabilities
B)exploits
C)compromises
D)payloads
سؤال
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)

A)phishing
B)identity theft
C)social engineering
D)a spyware attack
سؤال
Unsolicited commercial e-mail is better known as ________.

A)spam
B)adware
C)social engineering
D)identity theft
سؤال
Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)

A)Trojan horses
B)bots
C)viruses
D)worms
سؤال
Attack programs that can be remotely controlled by an attacker are ________.

A)bots
B)DoS programs
C)exploits
D)sock puppets
سؤال
Which of the following meets the definition of hacking ________.

A)to intentionally use a computer resource without authorization
B)to use a computer on which you have an account for unauthorized purposes
C)both A and B
D)neither A nor B
سؤال
Methods that hackers use to break into computers are ________.

A)cracks
B)magics
C)exploits
D)compromises
سؤال
Tricking users into doing something against their security interests is ________.

A)social engineering
B)hacking
C)both A and B
D)neither A nor B
سؤال
Credit card number thieves are called ________.(Pick the most precise answer.)

A)numbers racketeers
B)fraudsters
C)identity thieves
D)carders
سؤال
What type of attacker can do the most damage?

A)criminal attackers
B)hackers driven by curiosity
C)employees and ex-employees
D)national governments
سؤال
What type of attacker are most of attackers today?

A)disgruntled employees and ex-employees
B)career criminals
C)hackers motivated by a sense of power
D)cyberterrorists
سؤال
Which of the following tends to be more damaging to the victim?

A)credit card theft
B)identity theft
C)Both are about equally damaging to the victim.
D)Neither is damaging to the victim.
سؤال
Advanced persistent threats are ________.

A)inexpensive for the attacker
B)extremely dangerous for the victim
C)both A and B
D)neither A nor B
سؤال
An attack aimed at a single person or a small group of individuals is a(n)________ attack.(Choose the most specific answer.)

A)phishing
B)spear phishing
C)highly targeted
D)customized
سؤال
A specific encryption method is called a ________.

A)code
B)schema
C)key method
D)cipher
سؤال
Who are the most dangerous types of employees?

A)financial employees
B)manufacturing employees
C)IT security employees
D)former employees
سؤال
If you see a username and password on a Post-It note that anyone can see on a monitor,is it hacking if you use this information to log in?

A)Yes
B)No
C)We cannot say from the information given.
سؤال
DoS attacks attempt to ________.

A)hack a computer
B)reduce the availability of a computer
C)steal information from a computer
D)delete files on a computer
سؤال
You discover that you can get into other e-mail accounts after you have logged in under your account.You spend just a few minutes looking at another user's mail.Is that hacking?

A)Yes
B)No
C)We cannot say from the information given.
سؤال
A user picks the password "tiger." This is likely to be cracked quickly by a(n)________.

A)attack on an application running as root
B)brute-force attack
C)dictionary attack
D)reverse engineering attack
سؤال
Electronic signatures also provide ________ in addition to authentication.

A)message integrity
B)message encryption
C)both A and B
D)neither A nor B
سؤال
The password "R7%t&" can be defeated by a ________.

A)dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)All of the above could defeat the password equally quickly.
سؤال
In authentication,the ________ is the party trying to prove his or her identity.

A)supplicant
B)verifier
C)true party
D)all of the above
سؤال
SSL/TLS is used for ________.

A)Web applications
B)any application
C)both A and B
D)neither A nor B
سؤال
The password "NeVEr" can be defeated by a ________.

A)dictionary attack
B)hybrid dictionary attack
C)brute-force attack
D)none of the above
سؤال
Passwords are widely used because they ________.

A)are demanded by users
B)offer strong authentication
C)are the only authentication techniques known by most security professionals
D)are inexpensive to use
سؤال
Requiring someone to use a resource to prove his or her identity is ________.

A)confidentiality
B)authentication
C)authorization
D)both B and C
سؤال
________ is the general name for proofs of identity in authentication.

A)Credentials
B)Authorizations
C)Certificates
D)Signatures
سؤال
Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.

A)authentication
B)confidentiality
C)both A and B
D)neither A nor B
سؤال
In symmetric key encryption,a key must be ________ bits long,or longer,to be considered strong.(Choose the choice closest to the correct answer.)

A)36
B)56
C)64
D)128
سؤال
Using SSL/TLS for Web applications is attractive because SSL/TLS ________.

A)is essentially free to use
B)offers the strongest possible cryptographic protections
C)both A and B
D)neither A nor B
سؤال
The messages of VPNs ________.

A)share the same transmission lines
B)are encrypted
C)both A and B
D)neither A nor B
سؤال
To defeat brute-force attacks,a password must be ________.

A)long
B)complex
C)both A and B
D)neither A nor B
سؤال
Electronic signatures provide message-by-message ________.

A)authentication
B)confidentiality
C)both A and B
D)neither A nor B
سؤال
The password "velociraptor" can be defeated most quickly by a ________.

A)dictionary attack
B)reverse engineering attack
C)brute-force attack
D)None of the above because it is more than 8 characters long.
سؤال
Authentication should generally be ________.

A)as strong as possible
B)appropriate for a specific resource
C)the same for all resources, for consistency
D)all of the above
سؤال
Prepare2 can be cracked most quickly by a(n)________.

A)authentication attack
B)brute-force attack
C)dictionary attack
D)hybrid dictionary attack
سؤال
A password-cracking attack that tries all combinations of keyboard characters is called a ________.

A)dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)comprehensive keyboard attack
سؤال
In two-way dialogues using symmetric key encryption,how many keys are used for encryption and decryption?

A)1
B)2
C)4
D)none of the above
سؤال
A firewall will drop a packet if it ________.

A)is a definite attack packet
B)is a probable attack packet
C)both A and B
D)neither A nor B
سؤال
When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.

A)drops the packet
B)drops the packet and notifies an administrator
C)passes the packet
D)passes the packet, but notifies an administrator
سؤال
In digital certificate authentication,the verifier uses ________.

A)the supplicant's public key
B)the true party's public key
C)both A and B
D)neither A nor B
سؤال
How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP SYN segment?

A)process it through the Access Control List (ACL)
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
سؤال
In digital certificate authentication,the supplicant encrypts the challenge message with ________.

A)the supplicant's private key
B)the verifier's private key
C)the true party's private key
D)none of the above
سؤال
How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP segment which is an acknowledgement?

A)process it through the Access Control List (ACL)
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
سؤال
Iris scanning is attractive because of its ________.

A)low cost
B)precision
C)both A and B
D)neither A nor B
سؤال
How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP FIN segment?

A)process it through the Access Control List (ACL)
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
سؤال
Firewall log files should be read ________.

A)every month
B)every day
C)every week
D)usually only when a serious attack is suspected
سؤال
The digital certificate provides the ________.

A)private key of the supplicant
B)private key of the true party
C)public key of the supplicant
D)none of the above
سؤال
________ is the dominant firewall filtering method used on main border firewalls today.

A)ACL filtering
B)Application content filtering
C)Stateful packet inspection
D)none of the above
سؤال
Egress filtering examines packets ________.

A)arriving from the outside
B)leaving to the outside
C)both A and B
D)neither A nor B
سؤال
ACLs are used for packets in the ________ state.

A)connection-opening
B)ongoing communication
C)both A and B
D)neither A nor B
سؤال
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.(Read this question carefully.)

A)drops the packet
B)passes the packet
C)opens a new connection
D)does not approve the connection
سؤال
Stateful firewalls are attractive because of their ________.

A)high filtering sophistication
B)ability to filter complex application content
C)QoS guarantees
D)low cost
سؤال
Debit card is secure because it requires two credentials for authentication.This is also called ________.

A)the supplicant's authentication
B)the verifier's authentication
C)two-factor authentication
D)none of the above
سؤال
When a firewall identifies an attack packet,it ________.

A)discards the packet
B)copies information about the packet into a log file
C)both A and B
D)neither A nor B
سؤال
Which of the following is a form of biometrics?

A)reusable passwords
B)digital certificate authentication
C)facial recognition
D)all of the above
سؤال
In digital certificate authentication,the verifier gets the key it needs directly from the ________.

A)supplicant
B)verifier
C)true party
D)certificate authority
سؤال
Which of the following can be done today without the target's knowledge?

A)iris scanning
B)face recognition
C)both A and B
D)neither A nor B
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/88
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Network Security
1
Which of the following sometimes uses direct propagation between computers?

A)viruses
B)worms
C)Trojan horses
D)downloaders
B
2
Mobile code is another name for ________.

A)virus
B)worm
C)both A and B
D)neither A nor B
D
3
Small malware programs that download larger malware programs are called ________.

A)downloaders
B)scouts
C)foothold programs
D)stage-one programs
A
4
The Target attackers probably first broke into Target using the credentials of a(n)________.

A)low-level Target employee
B)Target IT employee
C)Target security employee
D)employee in a firm outside Target
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following can spread more rapidly?

A)directly-propagating viruses
B)directly-propagating worms
C)Both of the above can spread with approximately equal speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
6
The general name for evil software is ________.

A)virus
B)worm
C)exploit
D)malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
7
A program that can capture passwords as you enter them is ________.

A)a keystroke logger
B)data mining software
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Target attackers sold their stolen card information to ________.

A)crimeware shops
B)card shops
C)card counterfeiters
D)Hallmark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
9
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

A)keystroke loggers
B)anti-privacy software
C)spyware
D)data mining software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
10
Vulnerability-based attacks that occur before a patch is available are called ________ attacks.

A)preinstallation
B)stealth
C)malware
D)zero-day
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following attach themselves to other programs?

A)Viruses
B)Worms
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
12
The general name for a security flaw in a program is a ________.

A)virus
B)malware
C)security fault
D)vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ are full programs.

A)Viruses
B)Worms
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
14
Malware programs that masquerade as system files are called ________.

A)viruses
B)scripts
C)payloads
D)Trojan horses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following probably suffered the most financial damage from the Target breach?

A)retailers other than Target
B)banks
C)consumers
D)POS terminal vendors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.

A)malware
B)security error
C)vulnerability
D)security fault
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
17
Users typically can eliminate a vulnerability in one of their programs by ________.

A)installing a patch
B)doing a zero-day installation
C)using an antivirus program
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
18
Trojan horses can spread by ________.

A)e-mailing themselves to victim computers
B)directly propagating to victim computers
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
19
Viruses most commonly spread from one computer to another ________.

A)via e-mail
B)by propagating directly by themselves
C)through obfuscation
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following probably suffered the most financial damage from the Target breach?

A)Target
B)banks
C)consumers
D)POS vendors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
21
In distributed DoS attacks,the attacker sends messages directly to ________.

A)bots
B)the intended victim of the DoS attack
C)a command and control server
D)DOS servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
22
Pieces of code that are executed after the virus or worm has spread are called ________.

A)vulnerabilities
B)exploits
C)compromises
D)payloads
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
23
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)

A)phishing
B)identity theft
C)social engineering
D)a spyware attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
24
Unsolicited commercial e-mail is better known as ________.

A)spam
B)adware
C)social engineering
D)identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following can be upgraded after it is installed on a victim computer? (Choose the most specific answer.)

A)Trojan horses
B)bots
C)viruses
D)worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
26
Attack programs that can be remotely controlled by an attacker are ________.

A)bots
B)DoS programs
C)exploits
D)sock puppets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following meets the definition of hacking ________.

A)to intentionally use a computer resource without authorization
B)to use a computer on which you have an account for unauthorized purposes
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
28
Methods that hackers use to break into computers are ________.

A)cracks
B)magics
C)exploits
D)compromises
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
29
Tricking users into doing something against their security interests is ________.

A)social engineering
B)hacking
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
30
Credit card number thieves are called ________.(Pick the most precise answer.)

A)numbers racketeers
B)fraudsters
C)identity thieves
D)carders
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
31
What type of attacker can do the most damage?

A)criminal attackers
B)hackers driven by curiosity
C)employees and ex-employees
D)national governments
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of attacker are most of attackers today?

A)disgruntled employees and ex-employees
B)career criminals
C)hackers motivated by a sense of power
D)cyberterrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following tends to be more damaging to the victim?

A)credit card theft
B)identity theft
C)Both are about equally damaging to the victim.
D)Neither is damaging to the victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
34
Advanced persistent threats are ________.

A)inexpensive for the attacker
B)extremely dangerous for the victim
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
35
An attack aimed at a single person or a small group of individuals is a(n)________ attack.(Choose the most specific answer.)

A)phishing
B)spear phishing
C)highly targeted
D)customized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
36
A specific encryption method is called a ________.

A)code
B)schema
C)key method
D)cipher
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
37
Who are the most dangerous types of employees?

A)financial employees
B)manufacturing employees
C)IT security employees
D)former employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
38
If you see a username and password on a Post-It note that anyone can see on a monitor,is it hacking if you use this information to log in?

A)Yes
B)No
C)We cannot say from the information given.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
39
DoS attacks attempt to ________.

A)hack a computer
B)reduce the availability of a computer
C)steal information from a computer
D)delete files on a computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
40
You discover that you can get into other e-mail accounts after you have logged in under your account.You spend just a few minutes looking at another user's mail.Is that hacking?

A)Yes
B)No
C)We cannot say from the information given.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
41
A user picks the password "tiger." This is likely to be cracked quickly by a(n)________.

A)attack on an application running as root
B)brute-force attack
C)dictionary attack
D)reverse engineering attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
42
Electronic signatures also provide ________ in addition to authentication.

A)message integrity
B)message encryption
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
43
The password "R7%t&" can be defeated by a ________.

A)dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)All of the above could defeat the password equally quickly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
44
In authentication,the ________ is the party trying to prove his or her identity.

A)supplicant
B)verifier
C)true party
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
45
SSL/TLS is used for ________.

A)Web applications
B)any application
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
46
The password "NeVEr" can be defeated by a ________.

A)dictionary attack
B)hybrid dictionary attack
C)brute-force attack
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
47
Passwords are widely used because they ________.

A)are demanded by users
B)offer strong authentication
C)are the only authentication techniques known by most security professionals
D)are inexpensive to use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
48
Requiring someone to use a resource to prove his or her identity is ________.

A)confidentiality
B)authentication
C)authorization
D)both B and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
49
________ is the general name for proofs of identity in authentication.

A)Credentials
B)Authorizations
C)Certificates
D)Signatures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
50
Using encryption,you make it impossible for attackers to read your messages even if they intercept them.This is ________.

A)authentication
B)confidentiality
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
51
In symmetric key encryption,a key must be ________ bits long,or longer,to be considered strong.(Choose the choice closest to the correct answer.)

A)36
B)56
C)64
D)128
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
52
Using SSL/TLS for Web applications is attractive because SSL/TLS ________.

A)is essentially free to use
B)offers the strongest possible cryptographic protections
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
53
The messages of VPNs ________.

A)share the same transmission lines
B)are encrypted
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
54
To defeat brute-force attacks,a password must be ________.

A)long
B)complex
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
55
Electronic signatures provide message-by-message ________.

A)authentication
B)confidentiality
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
56
The password "velociraptor" can be defeated most quickly by a ________.

A)dictionary attack
B)reverse engineering attack
C)brute-force attack
D)None of the above because it is more than 8 characters long.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
57
Authentication should generally be ________.

A)as strong as possible
B)appropriate for a specific resource
C)the same for all resources, for consistency
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
58
Prepare2 can be cracked most quickly by a(n)________.

A)authentication attack
B)brute-force attack
C)dictionary attack
D)hybrid dictionary attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
59
A password-cracking attack that tries all combinations of keyboard characters is called a ________.

A)dictionary attack
B)hybrid mode dictionary attack
C)brute-force attack
D)comprehensive keyboard attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
60
In two-way dialogues using symmetric key encryption,how many keys are used for encryption and decryption?

A)1
B)2
C)4
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
61
A firewall will drop a packet if it ________.

A)is a definite attack packet
B)is a probable attack packet
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
62
When a packet that is part of an ongoing connection arrives at a stateful inspection firewall,the firewall usually ________.

A)drops the packet
B)drops the packet and notifies an administrator
C)passes the packet
D)passes the packet, but notifies an administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
63
In digital certificate authentication,the verifier uses ________.

A)the supplicant's public key
B)the true party's public key
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
64
How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP SYN segment?

A)process it through the Access Control List (ACL)
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
65
In digital certificate authentication,the supplicant encrypts the challenge message with ________.

A)the supplicant's private key
B)the verifier's private key
C)the true party's private key
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
66
How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP segment which is an acknowledgement?

A)process it through the Access Control List (ACL)
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
67
Iris scanning is attractive because of its ________.

A)low cost
B)precision
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
68
How will a stateful packet inspection (SPI)firewall handle a packet containing a TCP FIN segment?

A)process it through the Access Control List (ACL)
B)pass it if it is part of an approved connection
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
69
Firewall log files should be read ________.

A)every month
B)every day
C)every week
D)usually only when a serious attack is suspected
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
70
The digital certificate provides the ________.

A)private key of the supplicant
B)private key of the true party
C)public key of the supplicant
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
71
________ is the dominant firewall filtering method used on main border firewalls today.

A)ACL filtering
B)Application content filtering
C)Stateful packet inspection
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
72
Egress filtering examines packets ________.

A)arriving from the outside
B)leaving to the outside
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
73
ACLs are used for packets in the ________ state.

A)connection-opening
B)ongoing communication
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
74
When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall,the firewall ________.(Read this question carefully.)

A)drops the packet
B)passes the packet
C)opens a new connection
D)does not approve the connection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
75
Stateful firewalls are attractive because of their ________.

A)high filtering sophistication
B)ability to filter complex application content
C)QoS guarantees
D)low cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
76
Debit card is secure because it requires two credentials for authentication.This is also called ________.

A)the supplicant's authentication
B)the verifier's authentication
C)two-factor authentication
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
77
When a firewall identifies an attack packet,it ________.

A)discards the packet
B)copies information about the packet into a log file
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is a form of biometrics?

A)reusable passwords
B)digital certificate authentication
C)facial recognition
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
79
In digital certificate authentication,the verifier gets the key it needs directly from the ________.

A)supplicant
B)verifier
C)true party
D)certificate authority
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following can be done today without the target's knowledge?

A)iris scanning
B)face recognition
C)both A and B
D)neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 88 في هذه المجموعة.