DEVRY SEC360 WEEK 7 QUIZ

Question # 00037605 Posted By: spqr Updated on: 12/18/2014 01:15 PM Due on: 12/25/2014
Subject Business Topic General Business Tutorials:
Question
Dot Image

(TCO 10) Secure hashing is also known as _____.

public-key cryptography

a message digest

Transport Layer Security

Secure Sockets Layer

IPSec

Instructor Explanation: Week 6 Lecture and page 239 of course text

Points Received: 5 of 5

Comments:

Question 2. Question :

(TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

AES

RSA

Diffie Hellman

IN MD5

PSA

Instructor Explanation: Week 6 Lecture and pages 244-245 of course text

Points Received: 0 of 5

Comments:

Question 3. Question :

(TCO 11) Firewalls do not _____.

block unauthorized traffic

detect tampering

use simple software

filter words or phrases in traffic

enforce a security policy

Instructor Explanation: Week 6 Lecture and pages 275-279 of course text

Points Received: 0 of 5

Comments:

Question 4. Question :

(TCO 11) Which of the following is not a characteristic of a proxy server?

Configured to allow access only to specific systems

Maintains detailed audit information

Dependent on all other proxies on the bastion host

Runs as a nonprivileged user

Any service that is not supported by the proxy server is blocked.

Instructor Explanation: Page 273 of course text and Week 6 Lecture

Points Received: 5 of 5

Comments:

Question 5. Question :

(TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

software

remote procedure calls

agent technology

common interfaces

access to local audit records

Instructor Explanation: (Week 7 Lecture) Distributed agent technology with a central management module is most common.

Points Received: 0 of 5

Comments:

Question 6. Question :

(TCO 12) A decoy used to lure intruders into staying around is called a(n) _____.

pharm

phish

entrapment

honeypot

mug of ale

Instructor Explanation: (Week 7 Lecture) A honeypot is a decoy to capture the attention of intruders. A mug of ale might work, but that is not software!

Points Received: 5 of 5

Comments:

Question 7. Question :

(TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____.

drive-by attack

proxy-server attack

data-driven attack

penetration testing

steganography

Instructor Explanation: Page 271 of course text

Points Received: 5 of 5

Comments:

Question 8. Question :

(TCO 13) Which form of malware is dependent on operating systems and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

Instructor Explanation: Week 7 Lecture and page 304 of course text

Points Received: 5 of 5

Comments:

Question 9. Question :

(TCO 13) Which phase of the SDLC should have security representation?

Concept definition

Requirements definition

Design

Test and Evaluation

All phases

Instructor Explanation: Week 7 Lecture and page 307 of course text

Points Received: 5 of 5

Comments:

Question 10. Question :

(TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work?

Trap door

Virus

Worm

Trojan horse

Logic bomb

Instructor Explanation: Page 304 of course text

Points Received: 5 of 5

Comments:

* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)

Dot Image
Tutorials for this Question
  1. Tutorial # 00036861 Posted By: spqr Posted on: 12/18/2014 01:16 PM
    Puchased By: 5
    Tutorial Preview
    The solution of DEVRY SEC360 WEEK 7 QUIZ...
    Attachments
    DEVRY_SEC360_WEEK_7_QUIZ.docx (72.54 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    Du...nny Rating Top-quality and well-detailed work 09/17/2017
    fra...r007 Rating All important topics are covered in assignments 09/20/2017
    c...voe Rating Tutorials helped score A+ in exams 07/19/2016

Great! We have found the solution of this question!

Whatsapp Lisa