Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Only choose the correct answer: 2. Adam is using a public computer at an internet caf to update personal information. Which of the following step(s)
Only choose the correct answer:
2. Adam is using a public computer at an internet caf to update personal information. Which of the following step(s) can he take to ensure his privacy? A. Ensure no one is shoulder surfing B. Bookmark the site for fast retrieval Erase the browser history when finished D. A and C 3. Jasman has recently discovered that all the files and folders on his laptop are encrypted. He is a victim of a ransomware attack. Which is the best way for Jasman to get access to his files? A. Pay for the decryption key Hire technical support to create decryption key C. Format, reinstall, and use backups D. Buy a new laptop 4. Tini is explaining basic security to a new technician. She is teaching him how to secure ports on any server or workstation. Which of the following can be rules about ports? A. Block all incoming ports. B. Block ICMP packets. C. Block all unused ports. D. Block all nonstandard ports. 5. You are trying to identify all potential denial of service (DoS) attack vectors. In doing so, you hope to provide mitigation for these attack vectors. What is the reason protecting against Trojan horse attacks can reduce Dos attacks? A. Many DoS attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack. B. If you can stop a Trojan horse attack, you will also stop DoS attacks. C. A Trojan horse will often open ports and thus allow DoS attacks. D. A Trojan horse has much the same effect as a DoS attack. 6. What is the most significant weakness in a denial of service (DoS) attack from the attacker's viewpoint? A. The attack is often unsuccessful. B. The attack is difficult to execute. C. The attack is easy to stop D. The attack must be sustained. 7. A range of countermeasures can help defend against denial of services (DoS) attacks. What are THREE (3) methods for protecting against SYN flood attacks? A. SYN cookies, RST cookies and stack tweaking B. SYN cookies, DoS cookies and stack tweaking C. DoS cookies, RST cookies and stack deletion D. Dos cookies, SYN cookies, and stack deletion 8. Which of the following is a disadvantage of using an application gateway firewall? A. It is not very secure. B. It uses a great deal of resources. C. It can be difficult to configure. D. It can only work on router-based firewallsStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started