Читайте также: |
|
Software Firewall
Stateful Firewall
158. Perform encryption using the Playfair Cipher where the message is "FIBONACCI" and the key is "FINAL EXAM".
159. Encrypt the message I'M GLAD 2 U using the Caesar Cipher with the key 54
160. Which operation does Communication security do?
Protection of the individual or group of individuals who are authorized to access the organization and its operations.
Protection of networking components, connections, and contents.
Protection of the details of a particular operation or series of activities.
Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse.
???(not sure) Protection of an organization's communications media, technology, and content.
161. A _____________ is a router configured to screen packets between two networks. It routes traffic between the two networks and uses packet filtering rules to permit or deny traffic.
Packet filtering router
Screened Host (Bastion Host)
Firewall Appliance
Screened Subnet or Demilitarized Zone (DMZ)
Dual-homed Gateway
162. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
None of the statements
Asset
Hack
Access
Attack
163. One of the most famous documented DDoS attack is the Process Table. How does the Process Table work?
The victim's mail queue is flooded by an abundance of messages, causing system failure.
Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting.
The victim is flooded with InternetControlMessageProtocol (ICMP) "echo-reply" packets.
This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.
The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.
164. Using the RSA algorithm encrypt message M = 7 where p = 11, q = 13 and e = 11
165. Which of the following is(are) characteristic(s) of URL Rewriting?
I. Attacker redirects web traffic to another site that is controlled by the attacker.
II. Attacker acts as a proxy between the web server and the client.
III. Attacker writes his own web site address before the legitimate link.
Дата добавления: 2015-08-18; просмотров: 99 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
The quality or state of having ownership or control of some object or item. | | | I and II only |