Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Security
Quiz 1: Cybersecurity and Technology
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
This technology is used to measure and analyze human body characteristics for authentication purposes.
Question 2
Multiple Choice
__________ is an electronic or paper log used to track computer activity.
Question 3
Multiple Choice
This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.
Question 4
Multiple Choice
This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
Question 5
Multiple Choice
This is a mechanism for ensuring that only authorized users can copy or use specific software applications.
Question 6
Multiple Choice
At which two traffic layers do most commercial IDSes generate signatures?
Question 7
Multiple Choice
This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites.
Question 8
Multiple Choice
___________is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields produced by the signals.
Question 9
Multiple Choice
This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
Question 10
Multiple Choice
This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.
Question 11
Multiple Choice
Which of the following is an advantage of anomaly detection?
Question 12
Multiple Choice
A false positive can be defined as…
Question 13
Multiple Choice
This is an encryption/decryption key known only to the party or parties that exchange secret messages.
Question 14
Multiple Choice
What is the purpose of a shadow honeypot?
Question 15
Multiple Choice
This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
Question 16
Multiple Choice
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
Question 17
Multiple Choice
When discussing IDS/IPS, what is a signature?
Question 18
Multiple Choice
"Semantics-aware" signatures automatically generated by Nemean are based on traffic at which two layers?
Question 19
Multiple Choice
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?