Engineering, 31.12.2019 00:31, javonteoshamccaliste
Ssl/tls is used for
any application
web applications
both a and b
neither a nor b
small malware programs that download larger malware programs are called
scouts
downloaders
foothold programs
stage-one programs
single network addresses in different single networks are
unique if the two single networks use the same technology standard
unique
both a and b
neither a nor b
converting application messages into bits is called
encoding
encryption
exchange
encapsulation
guarantees by a provider to meet certain delivery quality specifications are called
speed quality guarantees
service warranties
service level agreements
contracts
advanced persistent threats are
extremely dangerous for the victim
inexpensive for the attacker
both a and b
neither a nor b
in antivirus filtering, the best ways to filter currently use
stateful inspection
behavioral detection
signature detection
application awareness
the general name for malware on a user's pc that collects sensitive information and sends this information to an attacker is
spyware
anti-privacy software
keystroke loggers
data mining software
firewall log files should be read
every week
every day
every month
usually only when a serious attack is suspected
when a firewall identifies an attack packet, it
discards the packet
copies information about the packet into a log file
both a and b
neither a nor b
who are the most dangerous types of employees?
it security employees
former employees
financial employees
manufacturing employees
in authentication, the is the party trying to prove his or her identity.
true party
verifier
supplicant
all of the above
in a firewall, vpn traversal
increases the effectiveness of firewall filtering
reduces firewall filtering effectiveness
both a and b
neither a nor b
which of the following can spread more rapidly?
directly-propagating viruses
directly-propagating worms
both of the above can spread with approximately equal speed.
the udp
has a checksum field
is unreliable
both a and b
neither a nor b
an iaas provides
application programs
servers
both a and b
neither a nor b
host p transmits a syn segment to host q. if host q is willing to open the connection, it will transmit a(n) segment.
syn
ack
syn/ack
none of the above
which of the following can be upgraded after it is installed on a victim computer? (choose the most specific answer.)
trojan horses
worms
viruses
bots
what type of attacker are most of attackers today?
disgruntled employees and ex-employees
cyberterrorists
career criminals
hackers motivated by a sense of power
802.11 data link layer standards govern
access point operation
frame organization
both a and b
neither a nor b
credit card number thieves are called (pick the most precise answer.)
identity thieves
numbers racketeers
fraudsters
carders
using encryption, you make it impossible for attackers to read your messages even if they intercept them. this is
authentication
confidentiality
both a and b
neither a nor b
look at and look at
antivirus programs, packets, firewalls, files
antivirus programs, packets, firewalls, packets
antivirus programs, files, firewalls, packets
antivirus programs, files, firewalls, files
iris scanning is attractive because of its
precision
low cost
both a and b
neither a nor b
the source socket is 60.171.18.22: 57707. the source is a(n)
ephemeral server
well-known server
server
client
Answers: 1
Engineering, 03.07.2019 15:10, EmilySerna
Heat is added to a piston-cylinder device filled with 2 kg of air to raise its temperature 400 c from an initial temperature of t1 27 cand pressure of pi 1 mpa. the process is isobaric process. find a)-the final pressure p2 b)-the heat transfer to the air.
Answers: 1
Engineering, 04.07.2019 18:10, ayoismeisjjjjuan
Manometers are good examples of measuring instruments, nowadays they are not as common as before. a)-capacitive probe gauges b)-gravitational gauges deformation ) gauges d)-digital gauges
Answers: 1
Engineering, 04.07.2019 19:10, Calliedevore
The proportional limit is always greater than the yield strength for a material. a)-trune b)- false
Answers: 3
Ssl/tls is used for
any application
web applications
both a and...
any application
web applications
both a and...
Mathematics, 08.06.2021 21:30
Mathematics, 08.06.2021 21:30
Mathematics, 08.06.2021 21:30
Biology, 08.06.2021 21:30
Mathematics, 08.06.2021 21:30
History, 08.06.2021 21:30
History, 08.06.2021 21:30
Biology, 08.06.2021 21:30