Deck 6: Intrusion and Emailinternet Security Techniques

Full screen (f)
exit full mode
Question
Which of the following is a non-technical type of intrusion or attack technique?

A)reverse engineering
B)malware analysis
C)social engineering
D)malware writing
Use Space or
up arrow
down arrow
to flip the card.
Question
If the data stored in the_______ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

A)memory
B)quarantine
C)cookies
D)hard drive
Question
The stored cookie which contains all your personal data about that website can be stolen away by________using or trojans.

A)attackers, malware
B)hackers, antivirus
C)penetration testers, malware
D)penetration testers, virus
Question
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
Question
Which of them is not a proper method for email security?

A)use strong password
B)use email encryption
C)spam filters and malware scanners
D)click on unknown links to explore
Question
What are email security services?

A)confidentiality
B)authentication
C)non-repudation of origin
D)all of the above
Question
PGP security system uses

A)public key cryptosystem
B)private key cryptosystem
C)public & private key cryptosystem
D)none of the mentioned
Question
What is the key size allowed in PGP?

A)1024-1056
B)1024-4056
C)1024-4096
D)1024-2048
Question
Who created PGP?

A)phil zimmermann
B)tim berners-lee
C)marc andreessen
D)ken thompson
Question
What is the PGP stand for?

A)permuted gap permission
B)permuted great privacy
C)pretty good privacy
D)none of the mentioned
Question
PGP makes use of which cryptographic algorithm?

A)des
B)aes
C)rsa
D)rabin
Question
PGP offers_______block ciphers for message encryption?

A)triple-des
B)cast
C)idea
D)all of the above
Question
S/MIME stands for________ .

A)standard multipurpose internet mail extensions.
B)secure multipurpose internet mail extensions.
C)secure multipurpose international mail extensions
D)standard multipurpose international mail extensions.
Question
is used for hiding the payment information from the merchant.

A)set.
B)ssl.
C)shttp
D)tsp
Question
The cryptography algorithms used in S/MIME are .

A)idea.
B)rc4
C)rsa,des-3
D)rc5
Question
In S/MIME,MLA stands for .

A)mailing list agent.
B)multipurpose list agent.
C)mail lock agent.
D)message link agen
Question
Which component is included in IP security?

A)authentication header (ah)
B)encapsulating security payload (esp)
C)internet key exchange (ike)
D)all of the mentioned
Question
WPA2 is used for security in

A)ethernet
B)bluetooth
C)wi-fi
D)email
Question
An attempt to make a computer resource unavailable to its intended users is called

A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Question
PGP is used in

A)browser security
B)email security
C)ftp security
D)wifi security
Question
In tunnel mode, IPSec protects the

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Question
IPSec is designed to provide security at the

A)transport layer
B)network layer
C)application layer
D)session layer
Question
Which of the following is not a strong security protocol?

A)https
B)ssl
C)smtp
D)sftp
Question
SSL primarily focuses on

A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
Question
Why did SSL certificate require in HTTP?

A)for making security weak
B)for making information move faster
C)for encrypted data sent over http protocol
D)for sending and receiving emails unencrypted
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Intrusion and Emailinternet Security Techniques
1
Which of the following is a non-technical type of intrusion or attack technique?

A)reverse engineering
B)malware analysis
C)social engineering
D)malware writing
social engineering
2
If the data stored in the_______ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

A)memory
B)quarantine
C)cookies
D)hard drive
cookies
3
The stored cookie which contains all your personal data about that website can be stolen away by________using or trojans.

A)attackers, malware
B)hackers, antivirus
C)penetration testers, malware
D)penetration testers, virus
attackers, malware
4
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of them is not a proper method for email security?

A)use strong password
B)use email encryption
C)spam filters and malware scanners
D)click on unknown links to explore
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
What are email security services?

A)confidentiality
B)authentication
C)non-repudation of origin
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
PGP security system uses

A)public key cryptosystem
B)private key cryptosystem
C)public & private key cryptosystem
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
What is the key size allowed in PGP?

A)1024-1056
B)1024-4056
C)1024-4096
D)1024-2048
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Who created PGP?

A)phil zimmermann
B)tim berners-lee
C)marc andreessen
D)ken thompson
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
What is the PGP stand for?

A)permuted gap permission
B)permuted great privacy
C)pretty good privacy
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
PGP makes use of which cryptographic algorithm?

A)des
B)aes
C)rsa
D)rabin
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
PGP offers_______block ciphers for message encryption?

A)triple-des
B)cast
C)idea
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
S/MIME stands for________ .

A)standard multipurpose internet mail extensions.
B)secure multipurpose internet mail extensions.
C)secure multipurpose international mail extensions
D)standard multipurpose international mail extensions.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
is used for hiding the payment information from the merchant.

A)set.
B)ssl.
C)shttp
D)tsp
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The cryptography algorithms used in S/MIME are .

A)idea.
B)rc4
C)rsa,des-3
D)rc5
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
In S/MIME,MLA stands for .

A)mailing list agent.
B)multipurpose list agent.
C)mail lock agent.
D)message link agen
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which component is included in IP security?

A)authentication header (ah)
B)encapsulating security payload (esp)
C)internet key exchange (ike)
D)all of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
WPA2 is used for security in

A)ethernet
B)bluetooth
C)wi-fi
D)email
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
An attempt to make a computer resource unavailable to its intended users is called

A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
PGP is used in

A)browser security
B)email security
C)ftp security
D)wifi security
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
In tunnel mode, IPSec protects the

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
IPSec is designed to provide security at the

A)transport layer
B)network layer
C)application layer
D)session layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is not a strong security protocol?

A)https
B)ssl
C)smtp
D)sftp
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
SSL primarily focuses on

A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Why did SSL certificate require in HTTP?

A)for making security weak
B)for making information move faster
C)for encrypted data sent over http protocol
D)for sending and receiving emails unencrypted
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.