Ask Computer Engineering Expert

1. Which of the following is an application-based attack?
ICMP flood

SYN flood

SQL injection

Distributed reflection denial of service

Question 2.
2. According to the video in Week 1, what are the typical steps used to compromise an organization?
Attack, scanning, footprinting, and enumeration

Footprinting, scanning, enumeration, and attack

Scanning, enumeration, attack, and footprinting

Footprinting, attack, scanning, and enumeration

Question 3.
3. Which network design is usually used to separate and protect private from public network resources?
Hardware and software firewalls

Patch management

DMZ

Stateful packet inspection

Question 4.
4. Three techniques that should be part of every network design include which of the following?
Packet filter, bastion host, circuit level firewalls

DMZs, Proxy servers, NAT

Firestarter, Norton personal firewall, outpost personal firewall

IP spoofing, SYN floods, ping floods

Question 5.
5. Which is not a consideration for which kind of firewall that should be implemented?
Size of network

Need to connect multiple LANs into a single WAN

Skill of administrator

Cost vs. benefit

Question 6.
6. Which firewall solution would be best for a home business, running Windows OS Professional, with minimal confidential data?
Client-Proxy-Destination service

Destination service-Client-Proxy

Proxy-Client-Destination Service

Proxy-Destination Service-Client

Question 7.
7. If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate
distributed denial of service attack in progress.

scanning of the system for vulnerabilities prior to an attack.

the system has been infiltrated by an outsider.

Trojan horse virus infection sending information back home.

Question 8.
8. A fake system that can be used as bait for attackers to attempt to break into is known as
intrusion deflection.

anomaly detection.

executable profiling.

Honeypot.

Question 9.
9. Which of these technologies is a combination of an encryption algorithm and a hash?
Digital signature

RSA

Conventional encryption

PGP

Question 10.
10. Which of the following statements is a weakness of symmetric encryption?
Modern math processors can break it quickly.

It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.

Because the key must be transmitted, the scheme is only as secure as your transport method.

Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.

Question 11.
11. At what layer of the OSI model does PPTP work?
Layer 1

Layer 2

Layer 3

Layers 2 and 3

Question 12.
12. What does L2TP stand for?
level 2 transfer protocol

layer 2 transfer protocol

layer 2 tunneling protocol

level 2 transfer protocol

Question 13.
13. Which Trojan horse is a small, self-installing remote administration system, which permits a user to control the infected system across a TCP/IP connection?
Back Orifice

Dropper

NetBus

Spybot

Question 14.
14. Which of the following is the most common method by which viruses spread?
By reading the e-mail address book and mailing itself to everyone listed

By broadcasting ICMP packets and following network connections

By accessing the web application and cloning sent mail

By users downloading and installing unauthorized files from the Web

Question 15.
15. Which of the following steps should be taken to lessen hacker threats from Windows default accounts?
Default administrator account should be deleted and the default user account should be given administrator privileges.

Default accounts should be deleted or disabled and a new account should be created with administrative privileges.

Default administrator and user accounts should be deleted.

All default accounts should be deleted or disabled.

Question 16.
16. Which of the following security templates are included in Windows servers?
HIsecdc, Hisecws, Websec, IPSec

DC security Securews, Rootsec, Supersec

Rootsec, Supersec Websec, IPSec

DC security, HIsecdc, Hisecws, Securews

Question 17.
17. Why does the textbook author state that technology alone is not a panacea for network security problems?
Advances in technology occur too rapidly for security pros to keep up with them.

Improvements in technology actually create the most security problems.

Technology cannot be effective if people do not follow appropriate procedures.

The author actually does say that technology solves network security problems.

Question 18.
18. What policy does the textbook author suggest for leaving employees?
Disable all accounts, e-mail, wireless, and cell phones

Tell their new employer about any security issues

Update their Facebook and LinkedIn account status

Have them sign a non-disclosure agreement

Question 19.
19. Which of the following is the first step in assessing a system?
Threat identification

System characterization

Control analysis

Likelihood determination

Question 20.
20. Which of the following is one reason to use a packet sniffer?
Cyber terrorism

Check for attached mass storage devices

Digital forensics of a hard drive

Establishing a baseline of network activity

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92530055
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As