Question
1) While using which type of networking device would each host 'see' all other traffic on the network? A) network router B) token ring network
1) While using which type of networking device would each host 'see' all other traffic on the network?
A) network router
B) token ring network
C) network hub
D) network switch
2) Which concept of cryptography is used to make the ciphertext look significantly different than the plaintext after encryption?
A) Diffusion
B) Obfuscation
C) Collision
D) Confusion
3) Which of the following is the primary risk from using outdated software?
A) It may not have all the features you need.
B) It may not have the most modern security features.
C) It may no longer be supported by the vendor.
D) It may be easier to break into than newer software.
4) An attacker sent multiple broadcast messages to the network routers, spoofing an IP address of one of the network servers. This caused the network to send a flood of packets to that server and it is no longer responding. What best describes this attack?
A) DDoS attack
B) TCP SYN flood attack
C) Smurf Attack
D) TCP hijacking attack
5) A network admin has noticed that several machines on her network are infected with malware that is sending a flood of packets to a target external to the network. What best describes this attack?
A) Backdoor
B) SYN Flood
C) DDoS
D) Botnet
6) A company is developing a new technology that is expected to become a huge success. The CSO is concerned about someone stealing the secrets related to this technology. Which of the following will help the CSO identify potential dangers related to the loss of this technology?
A) Vulnerability assessment
B) Privacy threshold assessment
C) Threat assessment
D) Privacy impact assessment
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started