Tag: security
Questions Related to security
-
An attack that attempts to overwhelm a network resource to deny legitimate users access to that resource
-
An attack that generally is not intented to cause permanent damage or loss but often cause inconvenience
-
An attack that initially appears to come from a legitimate source but will do damage once installed or run on your computer.
-
None of the Above
-
Authenticity, confidentiality, integrity, and non repudiation
-
Detection, analysis, containment and recovery
-
Encryption and decryption
-
Review, identification, substantiation and elimination
-
Authenticity
-
Confidentiality
-
Integrity
-
Nonrepudiation
-
Private or Secret key encryption
-
Public key encryption
-
Both 1 & 2
-
None of the above
-
DES
-
Triple DES
-
AES
-
None of the above
-
Firewall
-
Private key server
-
Public key server
-
None of the above
-
Top down
-
Bottom up
-
End-to-end
-
Across the lifecycle of the application
-
Using a combination of all of the above
-
SNMP
-
Telnet
-
FTP
-
All of the above
-
The data is accessible at each network node
-
They are the easiest target for spoofing attacks
-
They can only support weak user authentication
-
Transmitting data over an unsecured LAN allows all uses to access it.