Filters
Question type

Study Flashcards

Two methods of active wire tapping are "between lines transmission" and "____."


A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.


A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A ____ combines into one program the characteristics of other attacks.


A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The first widely destructive worm infected more than 6,000 systems over several days in 1988.

A) True
B) False

Correct Answer

verifed

verified

Public/private key encryption relies on the fact that there is no known formula for factoring large numbers greater than ____ digits.


A) 75
B) 80
C) 110
D) 150

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.


A) Spoofing
B) Phishing
C) Impersonating
D) Acting

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The immediate result of a worm is ____.


A) not noticeable
B) slower processing time of legitimate work
C) data loss
D) computer crash

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Some viruses are benign.

A) True
B) False

Correct Answer

verifed

verified

Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.


A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

A gap in system security is always malicious.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer