DEVRY SEC360 WEEK 7 QUIZ

(TCO 10) Secure hashing is also known as _____.
public-key cryptography
a message digest
Transport Layer Security
Secure Sockets Layer
IPSec
Instructor Explanation: Week 6 Lecture and page 239 of course text
Points Received: 5 of 5
Comments:
Question 2. Question :
(TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?
AES
RSA
Diffie Hellman
IN MD5
PSA
Instructor Explanation: Week 6 Lecture and pages 244-245 of course text
Points Received: 0 of 5
Comments:
Question 3. Question :
(TCO 11) Firewalls do not _____.
block unauthorized traffic
detect tampering
use simple software
filter words or phrases in traffic
enforce a security policy
Instructor Explanation: Week 6 Lecture and pages 275-279 of course text
Points Received: 0 of 5
Comments:
Question 4. Question :
(TCO 11) Which of the following is not a characteristic of a proxy server?
Configured to allow access only to specific systems
Maintains detailed audit information
Dependent on all other proxies on the bastion host
Runs as a nonprivileged user
Any service that is not supported by the proxy server is blocked.
Instructor Explanation: Page 273 of course text and Week 6 Lecture
Points Received: 5 of 5
Comments:
Question 5. Question :
(TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.
software
remote procedure calls
agent technology
common interfaces
access to local audit records
Instructor Explanation: (Week 7 Lecture) Distributed agent technology with a central management module is most common.
Points Received: 0 of 5
Comments:
Question 6. Question :
(TCO 12) A decoy used to lure intruders into staying around is called a(n) _____.
pharm
phish
entrapment
honeypot
mug of ale
Instructor Explanation: (Week 7 Lecture) A honeypot is a decoy to capture the attention of intruders. A mug of ale might work, but that is not software!
Points Received: 5 of 5
Comments:
Question 7. Question :
(TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____.
drive-by attack
proxy-server attack
data-driven attack
penetration testing
steganography
Instructor Explanation: Page 271 of course text
Points Received: 5 of 5
Comments:
Question 8. Question :
(TCO 13) Which form of malware is dependent on operating systems and replicating?
Trap door
Virus
Worm
Trojan
Logic bomb
Instructor Explanation: Week 7 Lecture and page 304 of course text
Points Received: 5 of 5
Comments:
Question 9. Question :
(TCO 13) Which phase of the SDLC should have security representation?
Concept definition
Requirements definition
Design
Test and Evaluation
All phases
Instructor Explanation: Week 7 Lecture and page 307 of course text
Points Received: 5 of 5
Comments:
Question 10. Question :
(TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work?
Trap door
Virus
Worm
Trojan horse
Logic bomb
Instructor Explanation: Page 304 of course text
Points Received: 5 of 5
Comments:
* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)

-
Rating:
5/
Solution: DEVRY SEC360 WEEK 7 QUIZ