Review - Network Sec

Security Plus

50 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
According to the 2007 FBI Computer Crime and Security Survey, the loss due to the theft of confidential data for 494 respondents was approximately ____.a. $1 million b. $10 million c. $50 million d. $100 million
$10 million
The _____ Act is designed to broaden the surveillance of law enforcement agencies so they can detect and suppress terrorism.a. Gramm-Leach-Bliley b. Sarbanes-Oxley c. California Database Security Breach d. USA Patriot
USA Patriot
According to the research group Postini, over ____ of daily email messages are unsolicited and could be carrying a malicious payload. a. one-third b. two-thirds c. three-fourths d. four-fifths
Two-thirds
A ____ is a program advertised as performing one activity but actually does something else. a. script b. virus c. Trojan d. worm
Trojan
One type of virtualization in which an entire operating system environment is simulated is known as ____ virtualization. a. NOS b. guest c. operating system d. host
Operating system
____ typically involves using client-side scripts written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker.a. Spam b. SQL injection c. Cross-site scripting (XSS) d. SQL scripting
Cross-site scripting (XSS)
____ is a process of ensuring that any inputs are “clean” and will not corrupt the system. a. Cross-site scripting b. SQL injection c. Script injection d. Input validation
Input validation
____ are active Internet connections that download a specific file that is available through a tracker. a. Torrents b. Applets c. ActiveX controls d. Scripts
Torrents
With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____.a. collision time b. slot time c. clear time d. tx time
Slot time
The most common type of antenna for war driving is an omnidirectional antenna, also known as a ____ antenna.a. bipole b. dipole c. GPS d. tagging
Dipole
____ is the name given to a wireless technology that uses short-range RF transmissions. a. Bluetooth b. Piconet c. Scatternet d. Wi-fi
Bluetooth
____ is the unauthorized access of information from a wireless device through a Bluetooth connection. a. Blue jacking b. Bluesnarfing c. Blue poisoning d. Blue spoofing
Bluesnarfing
____, networks can essentially be divided into three parts: network, subnet, and host. a. classful addressing b. subnetting c. stateful addressing d. stateless addressing
Subnetting
____ IP addresses are not assigned to any specific user or organization; instead, they can be used by any user on the private internal network. a. Public b. Virtual c. DMZ d. Private
Private
____ packet filtering keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.a. Stateless b. Stateful c. Classful d. Classless
Stateful