Description of this paper

sec 360

Description

solution


Question

1. (TCO 10) Secure hashing is also known as _____. (Points: 5) public-key cryptography;a message digest;Transport Layer Security;Secure Sockets Layer;IPSec;Question 2. 2. (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography? (Points: 5) AES;RSA;Diffie Hellman;MD5;PSA;Question 3. 3. (TCO 11) A packet filter that keeps track of the state of a connection is called a _____. (Points: 5) stateful inspection firewall;stateful inspection filter;stateful inspection router;stateful inspection bridge;stateful inspection gateway;Question 4. 4. (TCO 11) A Layer 2 firewall is also called a(n) _____. (Points: 5) packet-filtering router;bastion host;packet-filtering bridge;application-level gateway;circuit-level gateway;Question 5. 5. (TCO 12) Intrusions can be categorized into what two main classes? (Points: 5) Virus and worm intrusions;Misuse and anomaly intrusions;Trap-door and zombie intrusions;Pharming and phishing intrusions;Hacking and trojan intrusions;Question 6. 6. (TCO 12) A decoy used to lure intruders into staying around is called a(n) _____. (Points: 5) pharm;phish;entrapment;honeypot;mug of ale;Question 7. 7. (TCO 12) _____ intrusions are harder to detect than _____ intrusions. (Points: 5) Anomalous, misuse;Misuse, anomalous;Well-defined, unplanned;Well-planned, automated;Automated, well-planned;Question 8. 8. (TCO 13) Object orientation is a _____. (Points: 5) programming technique;modeling technique;design technique;communications technique;system design technique;Question 9. 9. (TCO 13) In which system life cycle phase should security policy be established? (Points: 5) Test and evaluation;Operations and maintenance;Requirements definition;Acquisition;Initiation;Question 10. 10. (TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work? (Points: 5) Trap door;Virus;Worm;Trojan horse;Logic bomb

 

Paper#70070 | Written in 18-Jul-2015

Price : $22
SiteLock