Filters
Question type

Study Flashcards

A password cracking attack that tries all combinations of keyboard characters is called a ________.


A) dictionary attack
B) hybrid mode dictionary attack
C) brute force attack
D) comprehensive keyboard attack

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Firewall log files should be read ________.


A) every hour
B) every day
C) every week
D) usually only when a serious attack is suspected

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Policies should drive ________.


A) implementation
B) oversight
C) both A and B
D) neither A nor B

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Deep inspection firewalls grew out of ________.


A) static packet filtering
B) stateful packet inspection
C) intrusion detection systems
D) none of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following can thwart directly-propagating worms?


A) firewalls
B) antivirus programs
C) both A and B
D) neither A nor B

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Credit card number thieves are called ________.(Pick the most precise answer.)


A) numbers racketeers
B) fraudsters
C) identity thieves
D) carders

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is not one of the four major security planning principles?


A) perimeter defense
B) risk analysis
C) comprehensive security
D) defense in depth

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Malware is a generic name for evil software.

A) True
B) False

Correct Answer

verifed

verified

Which type of firewall filtering looks at application-layer content?


A) static packet filtering
B) stateful packet inspection
C) deep inspection
D) all of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Balancing threats against protection costs is called ________.


A) economic justification
B) risk analysis
C) comprehensive security
D) defense in depth

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What type of filtering does an application-aware firewall use?


A) static packet filtering
B) stateful packet inspection
C) deep inspection
D) all of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

ACLs are used for packets in the ________ state.


A) connection-opening
B) ongoing communication
C) both A and B
D) neither A nor B

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Attack programs that can be remotely controlled by an attacker are ________.


A) bots
B) DoS programs
C) exploits
D) sock puppets

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A compromise is an attempted attack.

A) True
B) False

Correct Answer

verifed

verified

Antivirus programs can usually stop directly-propagating worms.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is true?


A) guidelines must be followed
B) guidelines must be considered
C) both A and B
D) neither A nor B

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

In digital certificate authentication,the supplicant does a calculation with ________.


A) the supplicant's private key
B) the verifier's private key
C) the true party's private key
D) none of the above

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Two-factor authentication usually will work ________.


A) even if the attacker controls the supplicant's computer
B) even if the attacker can intercept all authentication communication
C) both A and B
D) neither A nor B

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

An action that will stop many viruses is ________.


A) installing patches
B) the use of an antivirus program
C) both A and B
D) neither A nor B

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

________ is lying to get victims to do something against financial self interest.


A) Social engineering
B) Fraud

C) A) and B)
D) undefined

Correct Answer

verifed

verified

Showing 81 - 100 of 152

Related Exams

Show Answer