Читайте также:
|
|
A. Denial of Serive Attack
B. Password attack
C. Buffer overflow attack
D. Session Hijacking
E. All of the statements
81. One of the most famous documented DDoS attacks Apache2. How does the Apache2 work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
82. One of the most famous documented DDoS attacks Back. How does the Back work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
83. One of the most famous documented DDoS attacks CrashIIS. How does the CrashIIS work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
84. One of the most famous documented DDoS attacks Land. How does the Land work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
85. One of the most famous documented DDoS attacks Mailbomb. How does the Mailbomb work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash (/) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
86. Using Magic Square cipher encrypt the message “MAJOR” with the given key 3 and generated magic square.<br/>.M..RJA.O
87. In Magic Square cipher what will be the value of magic constant or magic sum M if the key is 17? 2465
88. Using Magic Square cipher decipher the message “..S....NS.....IE...O.S...” with the given key 5 and generated magic square.<br/> SESSION
89. What is Data integrity?
A. Ensuring information has not been altered by unauthorised or unknown means.
B. An authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
C. Secret undocumented entry point into a program, used to grant access without normal methods of access authentication.
D. Temporary encryption key used between two principals.
E. An identifier or number that is used only once.
90. The ___________ is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
A. MD5 Message Digest Algorithm
B. Magic Square
C. Data Encryption Standard
D. Feistel Cipher
E. None of the statements
Дата добавления: 2015-08-18; просмотров: 86 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
An attacker alters his identity so that someone thinks he is someone else | | | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams |