Search Header Logo

курсера 151-300

Authored by Alikhan Aitzhanov

Science

University

Used 8+ times

курсера 151-300
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?

· An XML Gateway.

· An application-level firewall.

· A packet-filtering firewall.

· All of the above.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which statement about Stateful firewalls is True?

· They have state tables that allow them to compare current packets with previous packets.

· They are less secure in general than Stateless firewalls.

· They are faster than Stateless firewalls.

· All of the above.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.

True

False

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?

· Known Plaintext

· Known Ciphertext

· Brute force

· Social Engineering

· Rainbow tables

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

What are two (2) drawbacks to using symmetric key encryption?

· The sender and recipient must find a secure way to share the key itself.

· You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.

· Symmetric key encryption is slower than asymmetric key encryption.

· A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.

6.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?

· Firewalls and Antivirus

· Effective Communications and Critical Thinking

· Teamwork and Public

· Speaking Networking and Programming

· Leadership and Organization

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what?”

· The Open Web Application Security Project (OWASP) Framework.

· The Information Technology Infrastructure Library (ITIL) framework.

· IT Security

· The CIA Triad.

· The Business Process Management Framework.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?