p7c09a

p7c09a - MULTIPLE CHOICE. Choose the one alternative that...

Info iconThis preview shows pages 1–105. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. The process of proving a user's identity is called ________. 1) _______ A) identification B) cryptography C) a ut nt tion 2 The process of proving a user's identity is called authenticati on. 2) _______ A) True. B) False. 3 The use of mathematic s to protect information in storage or in transmissio n is called ________. 3) _______ A) authentication B) authorization C) c ry og hy 4 The use of mathematic s to protect information in storage or in transmissio n is called authenticati on. 4) _______ A) True. B) False. 5 If a packet is a provable attack packet, the firewall will ________. 5) _______ A) log the packet B) drop and log the packet let the packet through D) drop the packet 6 If a packet is a provable attack packet, the firewall will log the packet, then let it through. 6) _______ A) True. B) False. 7 If a firewall examines a packet that is suspicious but is not a provable attack packet, the firewall will ________. 7) _______ A) log the packet B) drop the packet let the packet through D) drop and log the packet 8 A firewall will drop a packet if it is ________. 8) _______ A) suspicious B) both A and B Since some attack packets will inevitably get through firewalls to clients and servers, host hardening is necessary. 9) _______ A) True. B) False. 1 A benefit of using firewalls is that it eliminates the need to harden each host and therefore saves money. 10) ______ A) True. B) False. 1 A compromis e is a successful attack. 11) ______ A) True. B) False. 1 A compromis e is an attempted attack. 12) ______ A) True. B) False. 1 Compromis es also are called ________. 13) ______ A) incidents B) breache s Both of the above. D) Neither A nor B 1 Worms propagate within a computer by infecting other programs in that computer. 14) ______ A) True. B) False. 1 Viruses most commonly spread from one computer to another ________. 15) ______ A) via e- mail B) Both of the above. D) Neither A nor B An action that will stop many viruses is ________. 16) ______ A) patching vulne B) Neither A nor B Which of the following can use vulnerabilit y- enabled transmissio n between computers? 17) ______ A) Worms. B) Viruses . Both of the above. D) Neither A nor B 1 Which of the following can spread more rapidly? 18) ______ A) Worms. B) Both of the above can spread with equal speed. Which of the following can often be thwarted by vulnerabilit y patches? 19) ______ A) Worms. B) Viruses . 2 Pieces of code programs that are executed after the virus or worm has spread are called ________. 20) ______ A) exploits B) compromises D) vulnerabilities E) All of the above. Which of the following is classified as malware? 21) ______ A) Viruses. B) Antivir us programs. Both of the above. D) Neither A nor B 2 Programs that masquerad e as system files are called ________. 22) ______ A) payloads B)...
View Full Document

This note was uploaded on 06/07/2009 for the course ISM 4220 taught by Professor Manoeloliveira during the Summer '09 term at FIU.

Page1 / 710

p7c09a - MULTIPLE CHOICE. Choose the one alternative that...

This preview shows document pages 1 - 105. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online