Engineering, 31.12.2019 00:31 javonteoshamccaliste
Ssl/tls is used for
any application
web applications
both a and b
neither a nor b
small malware programs that download larger malware programs are called
scouts
downloaders
foothold programs
stage-one programs
single network addresses in different single networks are
unique if the two single networks use the same technology standard
unique
both a and b
neither a nor b
converting application messages into bits is called
encoding
encryption
exchange
encapsulation
guarantees by a provider to meet certain delivery quality specifications are called
speed quality guarantees
service warranties
service level agreements
contracts
advanced persistent threats are
extremely dangerous for the victim
inexpensive for the attacker
both a and b
neither a nor b
in antivirus filtering, the best ways to filter currently use
stateful inspection
behavioral detection
signature detection
application awareness
the general name for malware on a user's pc that collects sensitive information and sends this information to an attacker is
spyware
anti-privacy software
keystroke loggers
data mining software
firewall log files should be read
every week
every day
every month
usually only when a serious attack is suspected
when a firewall identifies an attack packet, it
discards the packet
copies information about the packet into a log file
both a and b
neither a nor b
who are the most dangerous types of employees?
it security employees
former employees
financial employees
manufacturing employees
in authentication, the is the party trying to prove his or her identity.
true party
verifier
supplicant
all of the above
in a firewall, vpn traversal
increases the effectiveness of firewall filtering
reduces firewall filtering effectiveness
both a and b
neither a nor b
which of the following can spread more rapidly?
directly-propagating viruses
directly-propagating worms
both of the above can spread with approximately equal speed.
the udp
has a checksum field
is unreliable
both a and b
neither a nor b
an iaas provides
application programs
servers
both a and b
neither a nor b
host p transmits a syn segment to host q. if host q is willing to open the connection, it will transmit a(n) segment.
syn
ack
syn/ack
none of the above
which of the following can be upgraded after it is installed on a victim computer? (choose the most specific answer.)
trojan horses
worms
viruses
bots
what type of attacker are most of attackers today?
disgruntled employees and ex-employees
cyberterrorists
career criminals
hackers motivated by a sense of power
802.11 data link layer standards govern
access point operation
frame organization
both a and b
neither a nor b
credit card number thieves are called (pick the most precise answer.)
identity thieves
numbers racketeers
fraudsters
carders
using encryption, you make it impossible for attackers to read your messages even if they intercept them. this is
authentication
confidentiality
both a and b
neither a nor b
look at and look at
antivirus programs, packets, firewalls, files
antivirus programs, packets, firewalls, packets
antivirus programs, files, firewalls, packets
antivirus programs, files, firewalls, files
iris scanning is attractive because of its
precision
low cost
both a and b
neither a nor b
the source socket is 60.171.18.22: 57707. the source is a(n)
ephemeral server
well-known server
server
client
Answers: 1
Engineering, 03.07.2019 23:20
Two technicians are discussing the intake air temperature (iat) sensor. technician a says that the computer uses the iat sensor as a backup to the engine coolant temperature (ect) sensor. technician b says that the powertrain control module (pcm) will subtract the calculated amount of fuel if the air measures hot. who is correct
Answers: 3
Engineering, 04.07.2019 18:10
The mass flow rate of the fluid remains constant in all steady flow process. a)- true b)- false
Answers: 1
Engineering, 04.07.2019 18:10
An air conditioning system consist of a 5 cm diameter pipe, operating at a pressure of 200 kpa. the air initially enters the pipe at 15°c with a velocity of 20 m/s and relative humidity of 80%. if the heat supply throughout the process is 960 w, determine the relative humidity and the temperature at the outlet
Answers: 3
Engineering, 04.07.2019 18:10
Aflywheel accelerates for 5 seconds at 2 rad/s2 from a speed of 20 rpm. determine the total number of revolutions of the flywheel during the period of its acceleration. a.5.65 b.8.43 c. 723 d.6.86
Answers: 2
Ssl/tls is used for
any application
web applications
both a and...
any application
web applications
both a and...
Chemistry, 18.10.2019 15:30
History, 18.10.2019 15:30
Mathematics, 18.10.2019 15:30
English, 18.10.2019 15:30
History, 18.10.2019 15:30
English, 18.10.2019 15:30
History, 18.10.2019 15:50
English, 18.10.2019 15:50
History, 18.10.2019 15:50
Chemistry, 18.10.2019 15:50