
курсера 151-300
Authored by Alikhan Aitzhanov
Science
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?
· An XML Gateway.
· An application-level firewall.
· A packet-filtering firewall.
· All of the above.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which statement about Stateful firewalls is True?
· They have state tables that allow them to compare current packets with previous packets.
· They are less secure in general than Stateless firewalls.
· They are faster than Stateless firewalls.
· All of the above.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.
True
False
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?
· Known Plaintext
· Known Ciphertext
· Brute force
· Social Engineering
· Rainbow tables
5.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
What are two (2) drawbacks to using symmetric key encryption?
· The sender and recipient must find a secure way to share the key itself.
· You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.
· Symmetric key encryption is slower than asymmetric key encryption.
· A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.
6.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?
· Firewalls and Antivirus
· Effective Communications and Critical Thinking
· Teamwork and Public
· Speaking Networking and Programming
· Leadership and Organization
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what?”
· The Open Web Application Security Project (OWASP) Framework.
· The Information Technology Infrastructure Library (ITIL) framework.
· IT Security
· The CIA Triad.
· The Business Process Management Framework.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?