Читайте также:
|
|
A. Possession
B. Utility
C. Integrity
D. Confidentiality
E. Authentication
141. Which cryptanalytic attack attempts to find two values in the domain of a function that map to the same value in its range?
Social Engineering attack | ||
Dictionary attack | ||
Birthday attack | ||
Brute-Force attack | ||
None of the statements |
142. How many keys are required for two people to communicate via a cipher?
One key for symmetric ciphers, two keys for asymmetric ciphers. | ||
One key for asymmetric ciphers, two keys for symmetric ciphers. | ||
One key for symmetric ciphers, one key for asymmetric ciphers. | ||
Two keys for symmetric ciphers, two keys for asymmetric ciphers. | ||
None of the statements. |
143. A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data in order to masquerade as one or more of the entities involved in a communication.
DoS Attack | ||
URL Rewriting attack | ||
DDoS Attack | ||
Tracking State attack | ||
Man-in-the-Middle attack |
144. Which of the following statements is NOT TRUE?
Firewalls can be configured to require user authentication. This allows network administrators to control, track specific user activity. | ||
No firewall can protect against inadequate or mismanaged policies. | ||
A firewall cannot and does not guarantee that your network is 100% secure. | ||
Firewalls cannot provide protection against viruses or malicious code. | ||
Firewalls can offer protection against inside attacks. |
145. One of the most famous documented DDoS attack is the SmurfAttack. How does the SmurfAttackwork?
Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting. | ||
The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them. | ||
The victim is flooded with InternetControlMessageProtocol (ICMP) "echo-reply" packets. | ||
The victim's mail queue is flooded by an abundance of messages, causing system failure. | ||
This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up. |
146. A function that maps a variable-length data block or message into a fixed-length value called a hash code. The function is designed in such a way that, when protected, it provides an authenticator to the data or message. Also referred to as a message digest.
Hash Function | ||
Feistel Cipher | ||
Honeypot | ||
Intrusion detection system | ||
Kerberos |
147. Which of the following are strengths of Application Gateway/Proxies Firewall?(Choose 3 answers)
Can have on performance. It requires more processing power and has the potential to become a bottleneck for the network. | ||
Application gateways/proxies do not allow a direct connection to be made between endpoints. They actually break the client/server model. | ||
Allow the network administrator to have more control over traffic passing through the firewall. They can permit or deny specific applications or specific features of an application. | ||
Typically have the best content filtering capabilities. Since they have the ability to examine the payload of the packet, they are capable of making decisions based on content. | ||
Typically require additional client configuration. Clients on the network may require specialized software or configuration changes to be able to connect to the application gateway/proxy |
148. Which of the following are strengths of Packet Filtering Firewall?(Choose 3 answers)
Packet filtering firewalls allow a direct connection to be made between the two endpoints. | ||
Packet filtering is typically faster than other packet screening methods. | ||
Packet filtering firewalls are typically less expensive. | ||
Defining rules and filters on a packet filtering firewall can be a complex task. | ||
Packet filtering firewalls can be implemented transparently. |
149. One of the most famous documented DDoS attack is the SSHProcessTable. How does the SSHProcessTablework?
This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up. | ||
This attack makes hundreds of connections to the victim with the Secure Shell (SSH) Protocol without completing the login process. | ||
The victim's mail queue is flooded by an abundance of messages, causing system failure. | ||
The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them. | ||
Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting. |
150. Which of the following is (are) about Screened Host (Bastion Host)?
I. Router provides packet filters for some basic services.
II. Bastion host proxies more risky services.
III. Not suitable for exporting services.
I and III only | ||
I and II only | ||
II and III only | ||
I only | ||
I, II and III |
152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
Vulnerability
Security Posture or Security Profile
Threat Agent
Security Model
Дата добавления: 2015-08-18; просмотров: 89 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
According to DAD triad, ___________ attempts to defeat availability. | | | Personal Firewall |