Placeholder

SEC 360 DeVry Week 7 Quiz Latest

$14.00

Quantity:

Product Description

SEC 360 DeVry Week 7 Quiz Latest

SEC 360 DeVry Week 7 Quiz Latest

SEC360

 

SEC 360 DeVry Week 7 Quiz Latest

Question 1. Question : (TCO 10) Secure hashing is also known as _____.

  • public-key cryptography
  • a message digest
  • Transport Layer Security
  • Secure Sockets Layer
  • IPSec

Question 2. Question : (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

  • AES
  • RSA
  • Diffie Hellman
  • IN MD5
  • PSA

Question 3. Question : (TCO 11) Firewalls do not _____.

  • block unauthorized traffic
  • detect tampering
  • use simple software
  • filter words or phrases in traffic
  • enforce a security policy

Question 4. Question : (TCO 11) Which of the following is not a characteristic of a proxy server?

  • Configured to allow access only to specific systems
  • Maintains detailed audit information
  • Dependent on all other proxies on the bastion host
  • Runs as a nonprivileged user
  • Any service that is not supported by the proxy server is blocked.

Question 5. Question : (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

  • software remote procedure calls
  • agent technology
  • common interfaces
  • access to local audit records

Question 6. Question : (TCO 12) A decoy used to lure intruders into staying around is called a(n) _____.

  • pharm
  • phish
  • entrapment
  • honeypot
  • mug of ale

Question 7. Question : (TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____.

  • drive-by attack
  • proxy-server attack
  • data-driven attack
  • penetration testing
  • steganography

Question 8. Question : (TCO 13) Which form of malware is dependent on operating systems and replicating?

  • Trap door
  • Virus
  • Worm
  • Trojan
  • Logic bomb

Question 9. Question : (TCO 13) Which phase of the SDLC should have security representation?

  • Concept definition
  • Requirements definition
  • Design
  • Test and Evaluation
  • All phases

Question 10. Question : (TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work?

  • Trap door
  • Virus
  • Worm
  • Trojan horse
  • Logic bomb
SEC 360 DeVry Week 7 Quiz Latest

SEC 360 DeVry Week 7 Quiz Latest

 

ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERALQUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT

There are no reviews yet.

Add your review