Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) While using which type of networking device would each host 'see' all other traffic on the network? A) network router B) token ring network

1) While using which type of networking device would each host 'see' all other traffic on the network?

A) network router

B) token ring network

C) network hub

D) network switch

2) Which concept of cryptography is used to make the ciphertext look significantly different than the plaintext after encryption?

A) Diffusion

B) Obfuscation

C) Collision

D) Confusion

3) Which of the following is the primary risk from using outdated software?

A) It may not have all the features you need.

B) It may not have the most modern security features.

C) It may no longer be supported by the vendor.

D) It may be easier to break into than newer software.

4) An attacker sent multiple broadcast messages to the network routers, spoofing an IP address of one of the network servers. This caused the network to send a flood of packets to that server and it is no longer responding. What best describes this attack?

A) DDoS attack

B) TCP SYN flood attack

C) Smurf Attack

D) TCP hijacking attack

5) A network admin has noticed that several machines on her network are infected with malware that is sending a flood of packets to a target external to the network. What best describes this attack?

A) Backdoor

B) SYN Flood

C) DDoS

D) Botnet

6) A company is developing a new technology that is expected to become a huge success. The CSO is concerned about someone stealing the secrets related to this technology. Which of the following will help the CSO identify potential dangers related to the loss of this technology?

A) Vulnerability assessment

B) Privacy threshold assessment

C) Threat assessment

D) Privacy impact assessment

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

What are twinsumers and how can marketers use this concept?

Answered: 1 week ago

Question

Given that P(B/A)=0.84 and P(A)=0.43, what is P( B and A)?

Answered: 1 week ago

Question

differentiate the function ( x + 1 ) / ( x ^ 3 + x - 6 )

Answered: 1 week ago