Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?

курсера 151-300

Quiz
•
Science
•
University
•
Easy
Alikhan Aitzhanov
Used 8+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
· An XML Gateway.
· An application-level firewall.
· A packet-filtering firewall.
· All of the above.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which statement about Stateful firewalls is True?
· They have state tables that allow them to compare current packets with previous packets.
· They are less secure in general than Stateless firewalls.
· They are faster than Stateless firewalls.
· All of the above.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.
True
False
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?
· Known Plaintext
· Known Ciphertext
· Brute force
· Social Engineering
· Rainbow tables
5.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
What are two (2) drawbacks to using symmetric key encryption?
· The sender and recipient must find a secure way to share the key itself.
· You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.
· Symmetric key encryption is slower than asymmetric key encryption.
· A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.
6.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?
· Firewalls and Antivirus
· Effective Communications and Critical Thinking
· Teamwork and Public
· Speaking Networking and Programming
· Leadership and Organization
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what?”
· The Open Web Application Security Project (OWASP) Framework.
· The Information Technology Infrastructure Library (ITIL) framework.
· IT Security
· The CIA Triad.
· The Business Process Management Framework.
Create a free account and access millions of resources
Similar Resources on Quizizz
25 questions
Describe Why Resource Management Is Important

Quiz
•
5th Grade - University
25 questions
Environmental Legislation

Quiz
•
12th Grade - University
25 questions
Digital Footprint

Quiz
•
6th Grade - University
25 questions
Overpopulation

Quiz
•
5th Grade - University
28 questions
Introduction to Computer Security

Quiz
•
University
25 questions
Coral Reef Monitoring Protocol

Quiz
•
University
25 questions
Aest Ag Tech

Quiz
•
9th Grade - University
25 questions
Environmental Management

Quiz
•
University
Popular Resources on Quizizz
20 questions
math review

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
10 questions
Human Body Systems and Functions

Interactive video
•
6th - 8th Grade
19 questions
Math Review

Quiz
•
3rd Grade
45 questions
7th Grade Math EOG Review

Quiz
•
7th Grade