Discuss the textbook author suggest for leaving employees

Assignment Help Computer Engineering
Reference no: EM131721364

1. Which of the following is an application-based attack?
ICMP flood

SYN flood

SQL injection

Distributed reflection denial of service

Question 2.
2. According to the video in Week 1, what are the typical steps used to compromise an organization?
Attack, scanning, footprinting, and enumeration

Footprinting, scanning, enumeration, and attack

Scanning, enumeration, attack, and footprinting

Footprinting, attack, scanning, and enumeration

Question 3.
3. Which network design is usually used to separate and protect private from public network resources?
Hardware and software firewalls

Patch management

DMZ

Stateful packet inspection

Question 4.
4. Three techniques that should be part of every network design include which of the following?
Packet filter, bastion host, circuit level firewalls

DMZs, Proxy servers, NAT

Firestarter, Norton personal firewall, outpost personal firewall

IP spoofing, SYN floods, ping floods

Question 5.
5. Which is not a consideration for which kind of firewall that should be implemented?
Size of network

Need to connect multiple LANs into a single WAN

Skill of administrator

Cost vs. benefit

Question 6.
6. Which firewall solution would be best for a home business, running Windows OS Professional, with minimal confidential data?
Client-Proxy-Destination service

Destination service-Client-Proxy

Proxy-Client-Destination Service

Proxy-Destination Service-Client

Question 7.
7. If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate
distributed denial of service attack in progress.

scanning of the system for vulnerabilities prior to an attack.

the system has been infiltrated by an outsider.

Trojan horse virus infection sending information back home.

Question 8.
8. A fake system that can be used as bait for attackers to attempt to break into is known as
intrusion deflection.

anomaly detection.

executable profiling.

Honeypot.

Question 9.
9. Which of these technologies is a combination of an encryption algorithm and a hash?
Digital signature

RSA

Conventional encryption

PGP

Question 10.
10. Which of the following statements is a weakness of symmetric encryption?
Modern math processors can break it quickly.

It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.

Because the key must be transmitted, the scheme is only as secure as your transport method.

Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.

Question 11.
11. At what layer of the OSI model does PPTP work?
Layer 1

Layer 2

Layer 3

Layers 2 and 3

Question 12.
12. What does L2TP stand for?
level 2 transfer protocol

layer 2 transfer protocol

layer 2 tunneling protocol

level 2 transfer protocol

Question 13.
13. Which Trojan horse is a small, self-installing remote administration system, which permits a user to control the infected system across a TCP/IP connection?
Back Orifice

Dropper

NetBus

Spybot

Question 14.
14. Which of the following is the most common method by which viruses spread?
By reading the e-mail address book and mailing itself to everyone listed

By broadcasting ICMP packets and following network connections

By accessing the web application and cloning sent mail

By users downloading and installing unauthorized files from the Web

Question 15.
15. Which of the following steps should be taken to lessen hacker threats from Windows default accounts?
Default administrator account should be deleted and the default user account should be given administrator privileges.

Default accounts should be deleted or disabled and a new account should be created with administrative privileges.

Default administrator and user accounts should be deleted.

All default accounts should be deleted or disabled.

Question 16.
16. Which of the following security templates are included in Windows servers?
HIsecdc, Hisecws, Websec, IPSec

DC security Securews, Rootsec, Supersec

Rootsec, Supersec Websec, IPSec

DC security, HIsecdc, Hisecws, Securews

Question 17.
17. Why does the textbook author state that technology alone is not a panacea for network security problems?
Advances in technology occur too rapidly for security pros to keep up with them.

Improvements in technology actually create the most security problems.

Technology cannot be effective if people do not follow appropriate procedures.

The author actually does say that technology solves network security problems.

Question 18.
18. What policy does the textbook author suggest for leaving employees?
Disable all accounts, e-mail, wireless, and cell phones

Tell their new employer about any security issues

Update their Facebook and LinkedIn account status

Have them sign a non-disclosure agreement

Question 19.
19. Which of the following is the first step in assessing a system?
Threat identification

System characterization

Control analysis

Likelihood determination

Question 20.
20. Which of the following is one reason to use a packet sniffer?
Cyber terrorism

Check for attached mass storage devices

Digital forensics of a hard drive

Establishing a baseline of network activity

Reference no: EM131721364

Questions Cloud

What is the expected return of mgm stock : Suppose MGM has a beta of 3.32 and AEP has a beta of 0.28. If the risk-free interest rate = 4.0% and the market risk premium = 10%, according to the CAPM:
Construct a system of ethics can be derived : Construct a system of ethics as they can be derived from Wollstonecrafts discourse in A Vindication of the Rights of Women.
Multichannel distribution systems gaining popularity today : Why are multichannel distribution systems gaining popularity today? Describe the advantages and disadvantages of using them.
What is the fund overall-weighted average : Refer to the previous problem. If the risk-free rate is 12% and the market risk premium is 6%, what is the required return on the Terrapins Fund?
Discuss the textbook author suggest for leaving employees : What policy does the textbook author suggest for leaving employees
What is the objective of the product promotion : How does the promotion mix differ for the two products based on the position on the life cycle and what is the objective of the product’s promotion?
What is the dividend yield-capital gains yield : What is the dividend yield, capital gains yield and realized return from this stock?
Primary purposes of conducting intellectual property audit : What are the two primary purposes of conducting an intellectual property audit? What risks does a company run if it doesn't periodically conduct.
Annualized rate of return on the investment : You invested $70,000 in a piece of real estate four years ago. Today it is worth $100,000. What is the annualized rate of return on the investment?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd