Chapter 2 Review Questions

Chapter 2 Review Questions - Chapter 2 Review Questions...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 2 Review Questions Review of attempt 1 Started on Wednesday, May 25, 2011, 07:56 PM Completed on Friday, May 27, 2011, 07:03 PM Time taken 1 day 23 hours Grade 94 out of a maximum of 100 ( 94 %) Question 1 Marks: 2 Attempting to reverse-calculate a password is called ____________________. Answer: Correct Marks for this submission: 2/2. Question 2 Marks: 2 In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. Choose one answer. a. zombie-in-the-middle b. sniff-in-the-middle c. server-in-the-middle d. man-in-the-middle
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Correct Marks for this submission: 2/2. Question 3 Marks: 2 A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. Choose one answer. a. denial-of-service b. distributed denial-of-service c. virus d. spam Correct Marks for this submission: 2/2. Question 4 Marks: 2 In a ____ attack, the attacker sends a large number of connection or information requests to a target. Choose one answer. a. denial-of-service b. distributed denial-of-service c. virus d. spam Correct Marks for this submission: 2/2. Question 5 Marks: 2 Intellectual property is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas.” Answer:
Background image of page 2
True False Correct Marks for this submission: 2/2. Question 6 Marks: 2 Complete loss of power for a moment is known as a ____. Choose one answer. a. sag b. fault c. brownout d. blackout Incorrect Marks for this submission: 0/2. Question 7 Marks: 2 Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash. Choose one answer. a. 64 b. 128 c. 256 d. 512 Correct Marks for this submission: 2/2. Question 8 Marks: 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Duplication of software-based intellectual property is more commonly known as software ____________________. Answer: Correct Marks for this submission: 2/2. Question 9 Marks: 2 A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset. Answer: Correct Marks for this submission: 2/2. Question 10 Marks: 2 The ____ data file contains the hashed representation of the user’s password. Choose one answer. a. SLA b. SNMP c. FBI d. SAM Correct Marks for this submission: 2/2. Question 11 Marks: 2 Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

Chapter 2 Review Questions - Chapter 2 Review Questions...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online