Question
Which firewall allows or blocks traffic based on state, port, and protocol? a. Proxy firewall b. Stateful inspection firewall c. UTM firewall d. none of
Which firewall allows or blocks traffic based on state, port, and protocol?
a.
Proxy firewall
b.
Stateful inspection firewall
c.
UTM firewall
d.
none of the above
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
What is NGFW?
a.
Next generation firewall
b.
New generation firewall
c.
Next general firewall
d.
none of the above
A device kept on credit card swiping machine to steal data is known as?
a.
Skimming
b.
Dumpster diving
c.
hacking
d.
phishing
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
which type of fraud is this - fraudulent actors impersonate a genuine customer by using their stolen documents to obtain a credit card?
a.
Keystroke logging
b.
Application fraud
c.
Phishing
d.
vishing
Which spamming technique is mentioned here - Special characters are inserted in the spam words?
a.
Social engineering
b.
Junk tags
c.
Invalid words
d.
none of the above
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
Active switching is?
a.
Sniffing Through The Hub
b.
Sniffing in the switch
c.
Sniffing Through The router
d.
none of the above
What is insider threat?
a.
security risk originating from within the organization
b.
security risk originating from outside the organization
c.
security risk originating from hardware malfunction
d.
none of the above
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
A malicious insider is known as?
a.
Turncloak
b.
pawns
c.
twistcloak
d.
None of the above
What is SSL?
a.
Secure service layer
b.
Secular socket layer
c.
Secure socket layer
d.
none of the above
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
What does SSL do?
a.
Provide security
b.
encrypt link between web server and browser
c.
it is a security protocol
d.
all of the above
What is DOS?
a.
Detail of service
b.
Denial of service
c.
Denial of software
d.
Detail of software
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
Which attack lead to memory buffer overflow?
a.
Flood Attacks
b.
ping-flood
c.
buffer overflow attacks
d.
volumetric attack
protecting information from being accessed by an unauthorized person on the internet. what is it?
a.
Authentication
b.
confidentiality
c.
integrity
d.
Non-repudiation
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
which is the dimension of ecommerce?
a.
privacy
b.
integrity
c.
availability
d.
all of the above
protecting information from being accessed by an unauthorized person on the internet. what is it?
a.
Authentication
b.
confidentiality
c.
integrity
d.
Non-repudiation
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
which is the dimension of ecommerce?
a.
privacy
b.
integrity
c.
availability
d.
all of the above
Identify the type of identity theft - The criminal files a false tax return ?
a.
Financial identity theft
b.
Tax-related identity theft
c.
Medical identity theft
d.
Criminal identity theft
Clear my choice
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
which Phishing attack attacks target senior management and other highly privileged roles?
a.
Smishing
b.
Vishing
c.
Whaling
d.
spear phishing
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started