Information Security - ch9

Information Security - ch9

University

61 Qs

quiz-placeholder

Similar activities

2023-2024 Living in IT Era Midterm Exam

2023-2024 Living in IT Era Midterm Exam

University

60 Qs

Soalan  Percubaan Tahap 4 (set 2) sesi april2019

Soalan Percubaan Tahap 4 (set 2) sesi april2019

University

60 Qs

PH INFOR KELAS X

PH INFOR KELAS X

2nd Grade - University

56 Qs

2 Facts 1 Lie

2 Facts 1 Lie

University

60 Qs

PPS - Chapter 7,8,9,10

PPS - Chapter 7,8,9,10

University

60 Qs

Internet Hardware

Internet Hardware

9th Grade - University

60 Qs

TEST FINAL EXCEL - a 11-a

TEST FINAL EXCEL - a 11-a

10th Grade - University

57 Qs

L12- ÔN TẬP KIỂM TRA GIỮA KỲ 1

L12- ÔN TẬP KIỂM TRA GIỮA KỲ 1

12th Grade - University

60 Qs

Information Security - ch9

Information Security - ch9

Assessment

Quiz

Computers

University

Hard

Created by

Jamie Gilbert

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

61 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) ______ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

port scanner

packet sniffer

honeypot

honey packet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

Buzz

Fuzz

Spike

Black

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is the action of luring an individual into committing a crime to get a conviction.

Entrapment

Enticement

Intrusion

Padding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ applications use a combination of techniques to detect an intrusion and then follow it back to its source.

Honeynet

Trap-and-trace

HIDPS

Packet Sniffer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To determine whether an attack has ocurred or is underway, NIDPSs compare measured activity to known ______ in their knowledge base.

vulnerabilities

fingerprints

signatures

footprints

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators should encourage users to experiment with hackerware tools as they assist the organization in detecting potential vulnerabilities in the systems.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fully distributed IDPS control strategy is an IDPS implementation approach in which all control functions are applied at the physical location of each IDPS component.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?