Information Security - ch9

Information Security - ch9

University

•

61 Qs

quiz-placeholder

Similar activities

AI-900 Azure AI Fundamentals

AI-900 Azure AI Fundamentals

University

•

60 Qs

IT Fundamentals 1

IT Fundamentals 1

9th Grade - University

•

63 Qs

Final Exam - Embedded Systems

Final Exam - Embedded Systems

University

•

60 Qs

Jaringan Komputer

Jaringan Komputer

University

•

60 Qs

ICT_Test

ICT_Test

University

•

59 Qs

Algorithm, Flowchart & Pseudocode

Algorithm, Flowchart & Pseudocode

University - Professional Development

•

66 Qs

TIN 7 BĂ i 1,2,3

TIN 7 BĂ i 1,2,3

7th Grade - University

•

60 Qs

Summative Test- Nursing Informatics

Summative Test- Nursing Informatics

University

•

60 Qs

Information Security - ch9

Information Security - ch9

Assessment

Quiz

•

Computers

•

University

•

Hard

Created by

Jamie Gilbert

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

61 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) ______ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

port scanner

packet sniffer

honeypot

honey packet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

Buzz

Fuzz

Spike

Black

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is the action of luring an individual into committing a crime to get a conviction.

Entrapment

Enticement

Intrusion

Padding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ applications use a combination of techniques to detect an intrusion and then follow it back to its source.

Honeynet

Trap-and-trace

HIDPS

Packet Sniffer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To determine whether an attack has ocurred or is underway, NIDPSs compare measured activity to known ______ in their knowledge base.

vulnerabilities

fingerprints

signatures

footprints

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators should encourage users to experiment with hackerware tools as they assist the organization in detecting potential vulnerabilities in the systems.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fully distributed IDPS control strategy is an IDPS implementation approach in which all control functions are applied at the physical location of each IDPS component.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?