Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
pl (1).docx
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
2.83 Mб
Скачать

151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.

Выберите один ответ.

Access

Asset

Attack

Hack

None of the statements

152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.

Выберите один ответ.

Threat Agent

Security Model

Control, Safeguard or Countermeasure

Security Posture or Security Profile

Vulnerability

153. In an RSA system, the public key of a given user is e = 31, n = 3599. What is the φ( n )?

Ответ:

154. Decrypt the message CVKKT W'YVT using the Caesar Cipher with the key 73.

Ответ:

155. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

A. Security service

B. Security attack

C. All of the statements

D. Security mechanism

E. Security threat

156. Free from mistake or error and having the value that the end-user expects.

A. Accuracy

B. Authenticity

C. Confidentiality

D. Authentication

E.

157. One of the most famous documented DDoS attack is the SmurfAttack work?

Duris

158. Which cryptanalytic attack attempts to find two values in the domain of a function that map to the same value in its range?

A. Social Engineering attack

B. Brute – Force attack

C. Birthday attack

D. None of the statements

E. Dictionary attack

159. Encrypt the message I’M GLAD 2 U using the Caesar Cipher with the key 54.

160. Zhauabin tekseru kerek.

161. By forcing all network traffic to pass through the firewall, there is a greater chance that network will become congested. Which problem can cause in this situation?

A. Network Address Translation

B. All of the statements

C. Single point of failure

D. Anti-Spoofing

E. Traffic bottlenecks

162. For a 3-bit key, the largest possible number is:

A. 3

B. 7

C. 9

D. 8

E. 6

163. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.

A. Security service

B. Security mechanism

C. Security attack

D. All of the statements

E. Security threat

164. One of most famous documented DDoS attack is the SYN Flood. How does the SYN Flood work?

The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.

165.

Which operation does Personal security do?

Выберите один ответ.

Protection of the individual or group of individuals who are authorized to access the organization and its operations.

Protection of the details of a particular operation or series of activities.

Protection of an organization's communications media, technology, and content.

Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse.

Protection of networking components, connections, and contents.

166.

Duris zhauabi: I men III

167. Duris

168. Duris zhauabi: Adaptive proxies

169. Duris zhauabi: II men III only

170. Duris

171. Duris zhauabi: Exposure

172. Duris

173. Duris zhauabi: I, II and III

174. Duris jauabi I, II and III

175.

176.

177.

Which of the following is(are) characteristic(s) of Tracking State? I. When a user logs on to a site a persistent authentication is maintained. II. This authentication can be stolen for masquerading as the user. III. Attacker writes his own web site address before the legitimate link.

Выберите один ответ.

I and III only

I and II only

I only

II and III only

I, I and III

178.

One of the most famous documented DDoS attack is the SYN Flood. How does the SYN Flood work?

Выберите один ответ.

This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.

The victim is flooded with InternetControlMessageProtocol (ICMP) "echo-reply" packets.

Attacker creates a packet that contains more than 65,536 bytes.

The victim's mail queue is flooded by an abundance of messages, causing system failure.

The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.

179.

Which type of firewall monitors TCP or UDP sessions?

Выберите один ответ.

Application Gateway/Proxies

Circuit-level gateways

Stateful packet

None of the statements

Packet filtering

180.

Perform decryption using the Playfair Cipher where the message is "FCHLNSGD" and the key is "FINAL EXAM".

Ответ:

181.

Which of the following is characteristic of Cyberpunk?

Выберите один ответ.

The cyberpunk is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.

The cyberpunk can be considered a recent mutation that combines the characteristics of the hacker, cracker, and phreak. A very dangerous combination indeed.

The cyberpunk destroys the information and software that they get into.

None of the statements.

The cyberpunk gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.

182.

Which of the following are strengths of Packet Filtering Firewall?(Choose 3 answers)

Выберите по крайней мере один ответ:

Packet filtering is typically faster than other packet screening methods.

Packet filtering firewalls are typically less expensive.

Defining rules and filters on a packet filtering firewall can be a complex task.

Packet filtering firewalls can be implemented transparently.

Packet filtering firewalls allow a direct connection to be made between the two endpoints.

183.

A ____________ firewall is often called a network layer firewall because the filtering is primarily done at the network layer (layer three) or the transport layer (layer four) of the OSI reference model.

Выберите один ответ.

Packet Filtering

Adaptive Proxies

Circuit level

Stateful Packet Inspection

Application level

184.

Using the RSA algorithm encrypt message M = 7 where p = 11, q = 13 and e = 11.

Ответ:

185.

Which operation does Network security do?

Выберите один ответ.

Protection of networking components, connections, and contents.

Protection of an organization's communications media, technology, and content.

Protection of the details of a particular operation or series of activities.

Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse.

Protection of the individual or group of individuals who are authorized to access the organization and its operations.

186.

_______________ firewall keeps track of the state of network connections (such as TCP streams) traveling across it.

Выберите один ответ.

Software

Network

Stateless

Stateful

Personal




187.

Using the RSA algorithm find d where p = 11, q = 13, e = 11 and M = 7.

Ответ:

188. Duris

189. Duris

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]