
- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
- •142. ______________ Firewall treats each network frame (Packet) in isolation.
- •143. How many keys are required for two people to communicate via a cipher?
- •144. ________________ - A software application which normally filters traffic entering or leaving a single computer.
- •144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
- •145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)
- •146. Which of the following statements is not true?
- •147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?
- •148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)
- •149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?
- •151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
- •152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
- •190. Dursi zhauabin tabu kerek
142. ______________ Firewall treats each network frame (Packet) in isolation.
Выберите один ответ.
|
Stateless |
|
|
Network |
|
|
Stateful |
|
|
Software |
|
|
Personal |
|
143. How many keys are required for two people to communicate via a cipher?
Выберите один ответ.
|
One key for symmetric ciphers, two keys for asymmetric ciphers. |
|
|
One key for symmetric ciphers, one key for asymmetric ciphers. |
|
|
Two keys for symmetric ciphers, two keys for asymmetric ciphers. |
|
|
None of the statements. |
|
|
One key for asymmetric ciphers, two keys for symmetric ciphers. |
|
144. ________________ - A software application which normally filters traffic entering or leaving a single computer.
Выберите один ответ.
|
Stateless Firewall |
|
|
Software Firewall |
|
|
Stateful Firewall |
|
|
Personal Firewall |
|
|
Network Firewall |
|
144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
Выберите один ответ.
|
Security service |
|
|
Security mechanism |
|
|
Security attack |
|
|
All of the statements |
|
|
Security threat |
|
145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)
Выберите по крайней мере один ответ:
|
Packet filtering is typically faster than other packet screening methods. |
|
|
Packet filtering firewalls allow a direct connection to be made between the two endpoints. |
|
|
Packet filtering firewalls are prone to certain types of attacks. |
|
|
Packet filtering firewalls can be implementedtransparently. |
|
|
Defining rules and filters on a packet filtering firewall can be a complex task. |
|
146. Which of the following statements is not true?
Выберите один ответ.
|
A firewall cannot and does not guarantee that your network is 100% secure. |
|
|
Firewalls can offer protection against inside attacks. |
|
|
Firewalls cannot provide protection against viruses or malicious code. |
|
|
Firewalls can be configured to require user authentication. This allows network administrators to control, track specific user activity. |
|
|
No firewall can protect against inadequate or mismanaged policies. |
|