Filters
Question type

What is the reason to use a stream cipher?

Correct Answer

verifed

verified

A stream cipher is designed to encrypt a...

View Answer

What does a security policy include?

Correct Answer

verifed

verified

Policies vary widely...

View Answer

Describe the problem of a buffer overflow.

Correct Answer

verifed

verified

The function strcpy() copies with no reg...

View Answer

Port scanning allows a hacker to__________________


A) known users' passwords
B) disrupt legitimate use of a system
C) detect a system's vulnerabilities
D) modify a transmission between a remote user and a system

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

To protect the systems we have to ensure security on the following level:


A) physical
B) network
C) operating system
D) all of the above

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

It is much faster for a computer to encode and decode ciphertext by using the usual symmetric algorithms than by using asymmetric algorithms.

A) True
B) False

Correct Answer

verifed

verified

True

A firewall is installed between the trusted and the untrusted.

A) True
B) False

Correct Answer

verifed

verified

How are one-time password systems implemented?

Correct Answer

verifed

verified

One-time password systems are implemente...

View Answer

In a symmetric encryption algorithm, one key is used to encrypt and a different one is used to decrypt.

A) True
B) False

Correct Answer

verifed

verified

Transport Layer Security (TLS) employs server's certificate from certification authority (CA).

A) True
B) False

Correct Answer

verifed

verified

User authentication can be based on_______________


A) the user's possession of something
B) the user's knowledge of something
C) an attribute of the user
D) all of the above

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

B

Why an asymmetric encryption algorithm uses two keys?

Correct Answer

verifed

verified

In an asymmetric encryption algorithm, t...

View Answer

MS Word documents in RTF format are resistant to macro viruses.

A) True
B) False

Correct Answer

verifed

verified

True

The attack surface is the set of points at which an attacker can try to break into the system.

A) True
B) False

Correct Answer

verifed

verified

When a user logs on, MW Windows 10 creates a list of files which can be used by the user.

A) True
B) False

Correct Answer

verifed

verified

TLS provides security at the _______ layer.


A) network
B) transport
C) application
D) none of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

______________ virus changes each time it is installed to avoid detection by antivirus software.


A) A polymorphic
B) A source code
C) An encrypted
D) A macro

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Vulnerability scans can check:


A) unexpected long-running processes
B) hidden network daemons
C) unauthorized programs in system directories
D) all of the above

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

________________ encrypts the information on the target computer and renders it inaccessible to the owner


A) Spyware
B) Ransomware
C) Logic bomb
D) all of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Describe the idea of masquerading attack.

Correct Answer

verifed

verified

During a masquerading, an atta...

View Answer

Showing 1 - 20 of 32

Related Exams

Show Answer