Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers.

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. According to DAD triad, ___________ attempts to defeat availability.
  2. Additional hotel services that are not included to the room price and are paid additionally
  3. An Amazing Design E 2. The Mysterious Artist D 3. Sculpture Balanced On A Single Feather 0 4. The Unusual Tool A 5. An Edible Painting C 6. A Wall as a Canvas B
  4. Ask your groupmates about Text 11C and let them answer the questions.
  5. Discuss the following questions about job in the group.
  6. Do Something Just Because It’s Fun.
  7. Exercise 1 Match each group of adjective with an appropriate noun and describe your friend using these words

A. Denial of Serive Attack

B. Password attack

C. Buffer overflow attack

D. Session Hijacking

E. All of the statements

 

81. One of the most famous documented DDoS attacks Apache2. How does the Apache2 work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

 

82. One of the most famous documented DDoS attacks Back. How does the Back work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

 

83. One of the most famous documented DDoS attacks CrashIIS. How does the CrashIIS work?

 

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

 

84. One of the most famous documented DDoS attacks Land. How does the Land work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

 

85. One of the most famous documented DDoS attacks Mailbomb. How does the Mailbomb work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

 

86. Using Magic Square cipher encrypt the message “MAJOR” with the given key 3 and generated magic square.<br/>.M..RJA.O

87. In Magic Square cipher what will be the value of magic constant or magic sum M if the key is 17? 2465

88. Using Magic Square cipher decipher the message “..S....NS.....IE...O.S...” with the given key 5 and generated magic square.<br/> SESSION

89. What is Data integrity?

A. Ensuring information has not been altered by unauthorised or unknown means.

B. An authentication mechanism that enables the creator of a message to attach a code that acts as a signature.

C. Secret undocumented entry point into a program, used to grant access without normal methods of access authentication.

D. Temporary encryption key used between two principals.

E. An identifier or number that is used only once.

 

90. The ___________ is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.

A. MD5 Message Digest Algorithm

B. Magic Square

C. Data Encryption Standard

D. Feistel Cipher

E. None of the statements

 


Дата добавления: 2015-08-18; просмотров: 86 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
An attacker alters his identity so that someone thinks he is someone else| The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams

mybiblioteka.su - 2015-2024 год. (0.006 сек.)