Details of this Paper

DEVRY SEC360 WEEK 7 QUIZ

Description

solution


Question

Question;(TCO 10) Secure hashing is also known as _____.;public-key cryptography;a message digest;Transport Layer Security;Secure Sockets Layer;IPSec;Instructor Explanation: Week 6 Lecture and page 239 of course text;Points Received: 5 of 5;Comments;Question 2. Question;(TCO 10) Which of the following uses symmetric-key or;shared-secret cryptography?;AES;RSA;Diffie Hellman;IN MD5;PSA;Instructor Explanation: Week 6 Lecture and pages 244-245 of course;text;Points Received: 0 of 5;Comments;Question 3. Question;(TCO 11) Firewalls do not _____.;block unauthorized traffic;detect tampering;use simple software;filter words or phrases in traffic;enforce a security policy;Instructor Explanation: Week 6 Lecture and pages 275-279 of course;text;Points Received: 0 of 5;Comments;Question 4. Question;(TCO 11) Which of the following is not a characteristic of a;proxy server?;Configured to allow access only to specific;systems;Maintains detailed audit information;Dependent on all other proxies on the bastion;host;Runs as a nonprivileged user;Any service that is not supported by the proxy;server is blocked.;Instructor Explanation: Page 273 of course text and Week 6 Lecture;Points Received: 5 of 5;Comments;Question 5. Question;(TCO 12) Modern intrusion detection systems act as sensors;for hosts and network devices and work in a centrally controlled distributed;fashion using _____.;software;remote procedure calls;agent technology;common interfaces;access to local audit records;Instructor Explanation: (Week 7 Lecture) Distributed agent technology;with a central management module is most common.;Points Received: 0 of 5;Comments;Question 6. Question;(TCO 12) A decoy used to lure intruders into staying around;is called a(n) _____.;pharm;phish;entrapment;honeypot;mug of ale;Instructor Explanation: (Week 7 Lecture) A honeypot is a decoy to;capture the attention of intruders. A mug of ale might work, but that is not;software!;Points Received: 5 of 5;Comments;Question 7. Question;(TCO 12) An event where seemingly harmless data is forwarded;by the router to a host on an internal network is known as a _____.;drive-by attack;proxy-server attack;data-driven attack;penetration testing;steganography;Instructor Explanation: Page 271 of course text;Points Received: 5 of 5;Comments;Question 8. Question;(TCO 13) Which form of malware is dependent on operating;systems and replicating?;Trap door;Virus;Worm;Trojan;Logic bomb;Instructor Explanation: Week 7 Lecture and page 304 of course text;Points Received: 5 of 5;Comments;Question 9. Question;(TCO 13) Which phase of the SDLC should have security;representation?;Concept definition;Requirements definition;Design;Test and Evaluation;All phases;Instructor Explanation: Week 7 Lecture and page 307 of course text;Points Received: 5 of 5;Comments;Question 10. Question;(TCO 13) Which form of malware contains hidden and malicious;functions disguised as a utility program that performs useful work?;Trap door;Virus;Worm;Trojan horse;Logic bomb;Instructor Explanation: Page 304 of course text;Points Received: 5 of 5;Comments;* Times are displayed;in (GMT-07:00) Mountain Time (US & Canada)

 

Paper#52627 | Written in 18-Jul-2015

Price : $19
SiteLock