ITSA255_Test1Review_Fall2017 #81-90
Juan's web server was down for an entire day last September. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?
96.67%
Which password attack is typically used specifically against password files that contain cryptographic hashes?
Birthday attacks
Which type of attack involves the creation of some deception in order to trick unsuspecting users?
Fabrication
Service-level agreements (SLAs) are optical backbone trunks for private optical backbone networks.
False
The auto industry has not yet implemented the Internet of Things (IoT).
False
With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?
Home agent (HA)
Which one of the following is NOT a good technique for performing authentication of an end user?
Identification number
Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?
Interoperability
Users throughout Alison's organization have been receiving unwanted commercial messages over the organization's instant messaging program. What type of attack is taking place?
Spim
A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded URL link or opening an email attachment.
True