Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which firewall allows or blocks traffic based on state, port, and protocol? a. Proxy firewall b. Stateful inspection firewall c. UTM firewall d. none of

Which firewall allows or blocks traffic based on state, port, and protocol?

a.

Proxy firewall

b.

Stateful inspection firewall

c.

UTM firewall

d.

none of the above

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

What is NGFW?

a.

Next generation firewall

b.

New generation firewall

c.

Next general firewall

d.

none of the above

A device kept on credit card swiping machine to steal data is known as?

a.

Skimming

b.

Dumpster diving

c.

hacking

d.

phishing

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

which type of fraud is this - fraudulent actors impersonate a genuine customer by using their stolen documents to obtain a credit card?

a.

Keystroke logging

b.

Application fraud

c.

Phishing

d.

vishing

Which spamming technique is mentioned here - Special characters are inserted in the spam words?

a.

Social engineering

b.

Junk tags

c.

Invalid words

d.

none of the above

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

Active switching is?

a.

Sniffing Through The Hub

b.

Sniffing in the switch

c.

Sniffing Through The router

d.

none of the above

What is insider threat?

a.

security risk originating from within the organization

b.

security risk originating from outside the organization

c.

security risk originating from hardware malfunction

d.

none of the above

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

A malicious insider is known as?

a.

Turncloak

b.

pawns

c.

twistcloak

d.

None of the above

What is SSL?

a.

Secure service layer

b.

Secular socket layer

c.

Secure socket layer

d.

none of the above

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

What does SSL do?

a.

Provide security

b.

encrypt link between web server and browser

c.

it is a security protocol

d.

all of the above

What is DOS?

a.

Detail of service

b.

Denial of service

c.

Denial of software

d.

Detail of software

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

Which attack lead to memory buffer overflow?

a.

Flood Attacks

b.

ping-flood

c.

buffer overflow attacks

d.

volumetric attack

protecting information from being accessed by an unauthorized person on the internet. what is it?

a.

Authentication

b.

confidentiality

c.

integrity

d.

Non-repudiation

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

which is the dimension of ecommerce?

a.

privacy

b.

integrity

c.

availability

d.

all of the above

protecting information from being accessed by an unauthorized person on the internet. what is it?

a.

Authentication

b.

confidentiality

c.

integrity

d.

Non-repudiation

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

which is the dimension of ecommerce?

a.

privacy

b.

integrity

c.

availability

d.

all of the above

Identify the type of identity theft - The criminal files a false tax return ?

a.

Financial identity theft

b.

Tax-related identity theft

c.

Medical identity theft

d.

Criminal identity theft

Clear my choice

Question 2

Not yet answered

Marked out of 1.00

Flag question

Question text

which Phishing attack attacks target senior management and other highly privileged roles?

a.

Smishing

b.

Vishing

c.

Whaling

d.

spear phishing

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions