CTC 452 Quiz 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What can an attacker use a port scanner to test for on a target computer?

OPEN SOCKETS

What is a VPN typically used for?

SECURE REMOTE ACCESS

Why might you want your security system to provide nonrepudiation?

SO A USER CAN'T DENY SENDING OR RECEIVING A COMMUNICATION

Which term is best described as an attack that relies on the gullibility of people?

SOCIAL ENGINEERING

Defense in depth can best described as which of the following?

A LAYERED APPROACH TO SECURITY

Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

CHECKSUM

Which of the following is NOT one of the three primary goals of information security?

IMPARTIALITY

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

MACRO

Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

MAN-IN-THE-MIDDLE

1. What is a program that appears to do something useful but is actually malware?

TROJAN


संबंधित स्टडी सेट्स

AWS cloud-practitioner-essentials

View Set

Class 6- Intro to Perfusion NCLEX

View Set

Chapter 21: Assessing Heart and Neck Vessels

View Set

Unit 4 Lung/Larynx Caner (test book) NCLEX

View Set

Sophia Art History I Units 2 Key Terms

View Set