Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

The quality or state of having ownership or control of some object or item.

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. |


Читайте также:
  1. A stateful firewall maintains a ______________, which is a list of active connections.
  2. A) Passive Infinitive in Complex Object and Complex Subject
  3. About Local Control and Control Change Transmission
  4. Adding a New Controller
  5. Alaska, the largest state in the US
  6. B) Read the text again and mark the statements True (T), False (F), Not Stated (NS).
  7. CASH FLOWS STATEMENTS

A. Possession

B. Utility

C. Integrity

D. Confidentiality

E. Authentication

 

141. Which cryptanalytic attack attempts to find two values in the domain of a function that map to the same value in its range?

  Social Engineering attack  
  Dictionary attack  
  Birthday attack  
  Brute-Force attack  
  None of the statements  

142. How many keys are required for two people to communicate via a cipher?

  One key for symmetric ciphers, two keys for asymmetric ciphers.  
  One key for asymmetric ciphers, two keys for symmetric ciphers.  
  One key for symmetric ciphers, one key for asymmetric ciphers.  
  Two keys for symmetric ciphers, two keys for asymmetric ciphers.  
  None of the statements.  

 

143. A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data in order to masquerade as one or more of the entities involved in a communication.

  DoS Attack  
  URL Rewriting attack  
  DDoS Attack  
  Tracking State attack  
  Man-in-the-Middle attack  

144. Which of the following statements is NOT TRUE?

  Firewalls can be configured to require user authentication. This allows network administrators to control, track specific user activity.  
  No firewall can protect against inadequate or mismanaged policies.  
  A firewall cannot and does not guarantee that your network is 100% secure.  
  Firewalls cannot provide protection against viruses or malicious code.  
  Firewalls can offer protection against inside attacks.  

145. One of the most famous documented DDoS attack is the SmurfAttack. How does the SmurfAttackwork?

  Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting.  
  The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.  
  The victim is flooded with InternetControlMessageProtocol (ICMP) "echo-reply" packets.  
  The victim's mail queue is flooded by an abundance of messages, causing system failure.  
  This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.  

146. A function that maps a variable-length data block or message into a fixed-length value called a hash code. The function is designed in such a way that, when protected, it provides an authenticator to the data or message. Also referred to as a message digest.

  Hash Function  
  Feistel Cipher  
  Honeypot  
  Intrusion detection system  
  Kerberos  

147. Which of the following are strengths of Application Gateway/Proxies Firewall?(Choose 3 answers)

  Can have on performance. It requires more processing power and has the potential to become a bottleneck for the network.  
  Application gateways/proxies do not allow a direct connection to be made between endpoints. They actually break the client/server model.  
  Allow the network administrator to have more control over traffic passing through the firewall. They can permit or deny specific applications or specific features of an application.  
  Typically have the best content filtering capabilities. Since they have the ability to examine the payload of the packet, they are capable of making decisions based on content.  
  Typically require additional client configuration. Clients on the network may require specialized software or configuration changes to be able to connect to the application gateway/proxy  

148. Which of the following are strengths of Packet Filtering Firewall?(Choose 3 answers)

  Packet filtering firewalls allow a direct connection to be made between the two endpoints.  
  Packet filtering is typically faster than other packet screening methods.  
  Packet filtering firewalls are typically less expensive.  
  Defining rules and filters on a packet filtering firewall can be a complex task.  
  Packet filtering firewalls can be implemented transparently.  

149. One of the most famous documented DDoS attack is the SSHProcessTable. How does the SSHProcessTablework?

  This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.  
  This attack makes hundreds of connections to the victim with the Secure Shell (SSH) Protocol without completing the login process.  
  The victim's mail queue is flooded by an abundance of messages, causing system failure.  
  The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.  
  Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting.  

150. Which of the following is (are) about Screened Host (Bastion Host)?
I. Router provides packet filters for some basic services.
II. Bastion host proxies more risky services.
III. Not suitable for exporting services.

  I and III only  
  I and II only  
  II and III only  
  I only  
  I, II and III  

 

152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.

Vulnerability

Security Posture or Security Profile

Threat Agent

Security Model


Дата добавления: 2015-08-18; просмотров: 89 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
According to DAD triad, ___________ attempts to defeat availability.| Personal Firewall

mybiblioteka.su - 2015-2024 год. (0.006 сек.)