Tag: security

Questions Related to security

  1. An attack that attempts to overwhelm a network resource to deny legitimate users access to that resource

  2. An attack that generally is not intented to cause permanent damage or loss but often cause inconvenience

  3. An attack that initially appears to come from a legitimate source but will do damage once installed or run on your computer.

  4. None of the Above


Correct Option: A
  1. Authenticity, confidentiality, integrity, and non repudiation

  2. Detection, analysis, containment and recovery

  3. Encryption and decryption

  4. Review, identification, substantiation and elimination


Correct Option: A
  1. Private or Secret key encryption

  2. Public key encryption

  3. Both 1 & 2

  4. None of the above


Correct Option: A
  1. Firewall

  2. Private key server

  3. Public key server

  4. None of the above


Correct Option: C
  1. Top down

  2. Bottom up

  3. End-to-end

  4. Across the lifecycle of the application

  5. Using a combination of all of the above


Correct Option: E
  1. The data is accessible at each network node

  2. They are the easiest target for spoofing attacks

  3. They can only support weak user authentication

  4. Transmitting data over an unsecured LAN allows all uses to access it.


Correct Option: A