subject
Engineering, 31.12.2019 00:31 javonteoshamccaliste

Ssl/tls is used for

any application

web applications

both a and b

neither a nor b

small malware programs that download larger malware programs are called

scouts

downloaders

foothold programs

stage-one programs

single network addresses in different single networks are

unique if the two single networks use the same technology standard

unique

both a and b

neither a nor b

converting application messages into bits is called

encoding

encryption

exchange

encapsulation

guarantees by a provider to meet certain delivery quality specifications are called

speed quality guarantees

service warranties

service level agreements

contracts

advanced persistent threats are

extremely dangerous for the victim

inexpensive for the attacker

both a and b

neither a nor b

in antivirus filtering, the best ways to filter currently use

stateful inspection

behavioral detection

signature detection

application awareness

the general name for malware on a user's pc that collects sensitive information and sends this information to an attacker is

spyware

anti-privacy software

keystroke loggers

data mining software

firewall log files should be read

every week

every day

every month

usually only when a serious attack is suspected

when a firewall identifies an attack packet, it

discards the packet

copies information about the packet into a log file

both a and b

neither a nor b

who are the most dangerous types of employees?

it security employees

former employees

financial employees

manufacturing employees

in authentication, the is the party trying to prove his or her identity.

true party

verifier

supplicant

all of the above

in a firewall, vpn traversal

increases the effectiveness of firewall filtering

reduces firewall filtering effectiveness

both a and b

neither a nor b

which of the following can spread more rapidly?

directly-propagating viruses

directly-propagating worms

both of the above can spread with approximately equal speed.

the udp

has a checksum field

is unreliable

both a and b

neither a nor b

an iaas provides

application programs

servers

both a and b

neither a nor b

host p transmits a syn segment to host q. if host q is willing to open the connection, it will transmit a(n) segment.

syn

ack

syn/ack

none of the above

which of the following can be upgraded after it is installed on a victim computer? (choose the most specific answer.)

trojan horses

worms

viruses

bots

what type of attacker are most of attackers today?

disgruntled employees and ex-employees

cyberterrorists

career criminals

hackers motivated by a sense of power

802.11 data link layer standards govern

access point operation

frame organization

both a and b

neither a nor b

credit card number thieves are called (pick the most precise answer.)

identity thieves

numbers racketeers

fraudsters

carders

using encryption, you make it impossible for attackers to read your messages even if they intercept them. this is

authentication

confidentiality

both a and b

neither a nor b

look at and look at

antivirus programs, packets, firewalls, files

antivirus programs, packets, firewalls, packets

antivirus programs, files, firewalls, packets

antivirus programs, files, firewalls, files

iris scanning is attractive because of its

precision

low cost

both a and b

neither a nor b

the source socket is 60.171.18.22: 57707. the source is a(n)

ephemeral server

well-known server

server

client

ansver
Answers: 1

Another question on Engineering

question
Engineering, 03.07.2019 23:20
Two technicians are discussing the intake air temperature (iat) sensor. technician a says that the computer uses the iat sensor as a backup to the engine coolant temperature (ect) sensor. technician b says that the powertrain control module (pcm) will subtract the calculated amount of fuel if the air measures hot. who is correct
Answers: 3
question
Engineering, 04.07.2019 18:10
The mass flow rate of the fluid remains constant in all steady flow process. a)- true b)- false
Answers: 1
question
Engineering, 04.07.2019 18:10
An air conditioning system consist of a 5 cm diameter pipe, operating at a pressure of 200 kpa. the air initially enters the pipe at 15°c with a velocity of 20 m/s and relative humidity of 80%. if the heat supply throughout the process is 960 w, determine the relative humidity and the temperature at the outlet
Answers: 3
question
Engineering, 04.07.2019 18:10
Aflywheel accelerates for 5 seconds at 2 rad/s2 from a speed of 20 rpm. determine the total number of revolutions of the flywheel during the period of its acceleration. a.5.65 b.8.43 c. 723 d.6.86
Answers: 2
You know the right answer?
Ssl/tls is used for

any application

web applications

both a and...
Questions
question
History, 18.10.2019 15:50
Questions on the website: 13722359