Information Security - ch9

Information Security - ch9

University

61 Qs

quiz-placeholder

Similar activities

ÔN TẬP Giữa Kỳ Môn Tin Học 8

ÔN TẬP Giữa Kỳ Môn Tin Học 8

7th Grade - University

62 Qs

APLIKASI KOMPUTER

APLIKASI KOMPUTER

University

63 Qs

Safety Signs

Safety Signs

University

58 Qs

Repaso Lenguaje C

Repaso Lenguaje C

University

65 Qs

GravenQUIZ

GravenQUIZ

KG - University

60 Qs

Module Communication - Email

Module Communication - Email

7th Grade - University

60 Qs

Doors

Doors

1st Grade - Professional Development

60 Qs

SECOND REVIEWER | EMPOWERMENT TECHNOLOGIES

SECOND REVIEWER | EMPOWERMENT TECHNOLOGIES

University

60 Qs

Information Security - ch9

Information Security - ch9

Assessment

Quiz

Computers

University

Hard

Created by

Jamie Gilbert

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

61 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) ______ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

port scanner

packet sniffer

honeypot

honey packet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

Buzz

Fuzz

Spike

Black

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is the action of luring an individual into committing a crime to get a conviction.

Entrapment

Enticement

Intrusion

Padding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ applications use a combination of techniques to detect an intrusion and then follow it back to its source.

Honeynet

Trap-and-trace

HIDPS

Packet Sniffer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To determine whether an attack has ocurred or is underway, NIDPSs compare measured activity to known ______ in their knowledge base.

vulnerabilities

fingerprints

signatures

footprints

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators should encourage users to experiment with hackerware tools as they assist the organization in detecting potential vulnerabilities in the systems.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fully distributed IDPS control strategy is an IDPS implementation approach in which all control functions are applied at the physical location of each IDPS component.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?