Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Only choose the correct answer: 2. Adam is using a public computer at an internet caf to update personal information. Which of the following step(s)

Only choose the correct answer:

image text in transcribedimage text in transcribedimage text in transcribed

2. Adam is using a public computer at an internet caf to update personal information. Which of the following step(s) can he take to ensure his privacy? A. Ensure no one is shoulder surfing B. Bookmark the site for fast retrieval Erase the browser history when finished D. A and C 3. Jasman has recently discovered that all the files and folders on his laptop are encrypted. He is a victim of a ransomware attack. Which is the best way for Jasman to get access to his files? A. Pay for the decryption key Hire technical support to create decryption key C. Format, reinstall, and use backups D. Buy a new laptop 4. Tini is explaining basic security to a new technician. She is teaching him how to secure ports on any server or workstation. Which of the following can be rules about ports? A. Block all incoming ports. B. Block ICMP packets. C. Block all unused ports. D. Block all nonstandard ports. 5. You are trying to identify all potential denial of service (DoS) attack vectors. In doing so, you hope to provide mitigation for these attack vectors. What is the reason protecting against Trojan horse attacks can reduce Dos attacks? A. Many DoS attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack. B. If you can stop a Trojan horse attack, you will also stop DoS attacks. C. A Trojan horse will often open ports and thus allow DoS attacks. D. A Trojan horse has much the same effect as a DoS attack. 6. What is the most significant weakness in a denial of service (DoS) attack from the attacker's viewpoint? A. The attack is often unsuccessful. B. The attack is difficult to execute. C. The attack is easy to stop D. The attack must be sustained. 7. A range of countermeasures can help defend against denial of services (DoS) attacks. What are THREE (3) methods for protecting against SYN flood attacks? A. SYN cookies, RST cookies and stack tweaking B. SYN cookies, DoS cookies and stack tweaking C. DoS cookies, RST cookies and stack deletion D. Dos cookies, SYN cookies, and stack deletion 8. Which of the following is a disadvantage of using an application gateway firewall? A. It is not very secure. B. It uses a great deal of resources. C. It can be difficult to configure. D. It can only work on router-based firewalls

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Driven Web Sites

Authors: Joline Morrison, Mike Morrison

2nd Edition

? 061906448X, 978-0619064488

More Books

Students also viewed these Databases questions

Question

How do Excel Pivot Tables handle data from non OLAP databases?

Answered: 1 week ago