Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Personal Firewall

A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. |


Читайте также:
  1. A stateful firewall maintains a ______________, which is a list of active connections.
  2. Personal information
  3. Personality quiz.
  4. THE HISTORY OF PERSONAL COMPUTING
  5. Личные и притяжательные местоимения (Personal and Possessive Pronouns)

Software Firewall

Stateful Firewall

158. Perform encryption using the Playfair Cipher where the message is "FIBONACCI" and the key is "FINAL EXAM".

159. Encrypt the message I'M GLAD 2 U using the Caesar Cipher with the key 54

160. Which operation does Communication security do?

Protection of the individual or group of individuals who are authorized to access the organization and its operations.

Protection of networking components, connections, and contents.

Protection of the details of a particular operation or series of activities.

Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse.

???(not sure) Protection of an organization's communications media, technology, and content.

161. A _____________ is a router configured to screen packets between two networks. It routes traffic between the two networks and uses packet filtering rules to permit or deny traffic.

Packet filtering router

Screened Host (Bastion Host)

Firewall Appliance

Screened Subnet or Demilitarized Zone (DMZ)

Dual-homed Gateway

162. A subject or object's ability to use, manipulate, modify, or affect another subject or object.

None of the statements

Asset

Hack

Access

Attack

163. One of the most famous documented DDoS attack is the Process Table. How does the Process Table work?

The victim's mail queue is flooded by an abundance of messages, causing system failure.

Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting.

The victim is flooded with InternetControlMessageProtocol (ICMP) "echo-reply" packets.

This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.

The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.

164. Using the RSA algorithm encrypt message M = 7 where p = 11, q = 13 and e = 11

165. Which of the following is(are) characteristic(s) of URL Rewriting?

I. Attacker redirects web traffic to another site that is controlled by the attacker.

II. Attacker acts as a proxy between the web server and the client.

III. Attacker writes his own web site address before the legitimate link.


Дата добавления: 2015-08-18; просмотров: 99 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
The quality or state of having ownership or control of some object or item.| I and II only

mybiblioteka.su - 2015-2024 год. (0.006 сек.)