Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Media Study
Q:
ARP is used to resolve 48-bit IP addresses into 32-bit local MAC addresses.
Q:
________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.
A) Rate limiting
B) False open
C) Black holing
D) None of the above
Q:
A firewall does note set aside resources for a connection when a SYN segment arrives, so handling a large number of false SYN segments is only a small burden.
Q:
________ is one method of thwarting DoS attacks by dropping all IP packets from an attacker.
A) Black holing
B) ICMP echo
C) P2P redirect
D) None of the above
Q:
Most DoS attacks are difficult to detect.
Q:
A ________ is an older attack that uses an illegally large IP packet to crash an operating system.
A) smurf flood
B) P2P redirect
C) ping of death
D) None of the above
Q:
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a single ICMP request is responded to by multiple hosts.
Q:
In a smurf flood DoS attack, attackers can benefit from a multiplier effect because multiple ICMP requests are responded to by a single host.
Q:
In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim.
Q:
Listing your friend's home in the local classifieds at a low price is equivalent to a ________.
A) P2P redirect
B) P2P port
C) DDoS
D) None of the above
Q:
In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is the same.
Q:
In a P2P attack, there is a change in the overall volume of traffic but the traffic pattern is the same.
Q:
________ are an additional layer of compromised hosts that are used to manage large groups of bots.
A) Botnets
B) Handlers
C) Phatbots
D) None of the above
Q:
Once established, botnets can be leased to other criminals for DoS attacks.
Q:
An attacker controlling bots in a coordinated attack against a victim is known as a ________.
A) DoS attack
B) DDoS attack
C) ICMP
D) None of the above.
Q:
________ are compromised hosts running malware controlled by the hacker.
A) DDoS
B) ICMP
C) Bots
D) None of the above
Q:
SYN-ACK can be best described as the second part of a three-way TCP handshake sent in response to a SYN.
Q:
ICMP can be best described as the second part of a three-way TCP handshake sent in response to a SYN.
Q:
A ________ attack is when a webserver is flooded with application layer web requests.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Q:
A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Q:
A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Q:
________ is the process of obscuring an attackers source IP address.
A) Backscatter
B) Spoofing
C) IP Flood
D) None of the above
Q:
Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address.
Q:
An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer.
Q:
A direct attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer.
Q:
DoS attacks can cause harm by ________.
A) stopping a critical service
B) slowly degrading services over a period of time
C) Both A and B
D) Neither A nor B
Q:
The ultimate goal of a DoS attack is to ________.
A) cause harm
B) frustrate users
C) practice hacking
D) None of the above
Q:
A DoS attack makes a server or network unavailable by flooding it with attack packets.
Q:
DoS network attacks are fairly uncommon.
Q:
"Breadth of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is possible.
Q:
"Death of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is impossible.
Q:
In regards to network security, ________ is the policy-driven control of access to systems, data, and dialogues.
A) confidentiality
B) integrity
C) access control
D) availability
Q:
Ensuring appropriate network ________ means preventing attackers from altering the capabilities or operation of the network.
A) confidentiality
B) integrity
C) availability
D) functionality
Q:
In regards to network security, ________ means preventing unauthorized users from gaining information about the network structure, data flowing across the network, network protocols used, or packet header values.
A) confidentiality
B) integrity
C) availability
D) authentication
Q:
Ensuring network ________ means that authorized users have access to information, services, and network resources.
A) confidentiality
B) integrity
C) availability
D) authentication
Q:
Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.
Q:
Which of the following is one of the key lengths offered by AES?
A) 112 bits
B) 192 bits
C) Both A and B
D) Neither A nor B
Q:
________ is efficient enough in processing power and RAM requirements to be used on small devices, such as PDAs and cell phones.
A) 3DES
B) AES
C) Both A and B
D) Neither A nor B
Q:
3DES is ________.
A) very slow
B) strong enough for communication in corporations
C) expensive in terms of processing cost
D) All of the above
Q:
Which of the following is one of the effective key lengths in 3DES?
A) 40 bits
B) 110 bits
C) Both A and B
D) Neither A nor B
Q:
Which of the following is one of the effective key lengths in 3DES?
A) 56 bits
B) 100 bits
C) 112 bits
D) None of the above
Q:
DES uses block encryption.
Q:
The 56-bit key size ________.
A) is sufficient for major business transactions
B) is sufficient for most residential consumer applications
C) is considered a strong length
D) All of the above
Q:
A DES key is ________ bits long.
A) 40
B) 56
C) 100
D) 128
Q:
A DES key is 40 bits long.
Q:
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.
A) 8
B) 40
C) 100
D) 256
Q:
Which of the following statements accurately describes RC4?
A) RC4 is very slow.
B) RC4 uses a large amount of RAM.
C) RC4 can use a broad range of key lengths.
D) All of the above
Q:
Which of the following statements accurately describes RC4?
A) RC4 is extremely fast.
B) RC4 always uses a 40-bit key.
C) Both A and B
D) Neither A nor B
Q:
In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.
A) 6
B) 8
C) 100
D) 1,000
Q:
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?
A) 7 times as long
B) 14 times as long
C) 128 times as long
D) 256 times as long
Q:
The best way to thwart exhaustive searches by cryptanalysts is ________.
A) to use codes
B) to make the key very long
C) randomize the key thoroughly
D) All of the above
Q:
Nearly all encryption for confidentiality uses symmetric key encryption ciphers.
Q:
Nearly all encryption for confidentiality uses ________ encryption ciphers.
A) public key
B) symmetric key
C) hashing
D) None of the above
Q:
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt?
A) 1
B) 2
C) 4
D) 8
Q:
In codes, code symbols may represent ________.
A) complete words
B) complete phrases
C) individual letters
D) All of the above
Q:
________ ciphers leave letters in their original positions.
A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Q:
________ ciphers move letters around within a message but characters are not substituted.
A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Q:
Someone who breaks encryption is called a ________.
A) cracker
B) coder
C) hacker
D) cryptanalyst
Q:
A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.
A) key
B) cipher
C) plaintext
D) code
Q:
A ________ is a mathematical process used in encryption and decryption.
A) key
B) cipher
C) plaintext
D) coding method
Q:
Which of the following is transmitted across a network?
A) The plaintext
B) The ciphertext
C) Both A and B
D) Neither A nor B
Q:
________ is the security guarantee that people who intercept messages cannot read them.
A) Integrity
B) Availability
C) Confidentiality
D) Encryption
Q:
________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.
A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality
Q:
Companies can enforce policies for ________.
A) SSL/TLS
B) IPsec security associations
C) Both A and B
D) Neither A nor B
Q:
When two parties in an IPsec connection communicate back and forth, there are ________ security associations.
A) 1
B) 2
C) 3
D) 4
Q:
IPsec tunnel mode ________.
A) provides host-to-host protection
B) is firewall-friendly
C) Both A and B
D) Neither A nor B
Q:
________ offers transparent protection.
A) SSL/TLS
B) IPsec
C) Both A and B
D) Neither A nor B
Q:
Which of the following layers does IPsec protect?
A) The transport layer
B) The application layer
C) Both of the above
D) Neither of the above
Q:
IPsec operates at the ________ layer.
A) data link
B) internet
C) transport
D) application
Q:
In SSL/TLS, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ________.
A) system standard
B) cipher suite
C) security method
D) security method and options
Q:
A commonly SSL/TLS-aware application is ________.
A) webservice
B) database
C) Both A and B
D) Neither A nor B
Q:
SSL/TLS protection is transparent to applications.
Q:
SSL/TLS operates at the ________ layer.
A) internet
B) transport
C) application
D) None of the above.
Q:
SSL/TLS is used for ________ VPNs.
A) host-to-host
B) remote access
C) Both A and B
D) Neither A nor B
Q:
SSL/TLS was developed for remote access VPNs.
Q:
SSL/TLS was developed for ________ VPNs.
A) host-to-host
B) site-to-site
C) Both A and B
D) Neither A nor B
Q:
When you make a purchase over the Internet, your sensitive traffic is almost always protected by ________ VPN transmission.
A) SSL/TLS
B) IPsec
C) Both A and B
D) Neither A nor B
Q:
Which types of VPNs use VPN gateways?
A) Host-to-host VPNs
B) Remote access VPNs
C) Both A and B
D) Neither A nor B
Q:
Site-to-site VPNs typically decrypt messages when they arrive from the outside.
Q:
A remote access VPN typically gives users access to multiple resources within a site.