Telecommunication and Information Technology > QUESTIONS & ANSWERS > University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 3 & 4 Q (All)
QUESTION 1 1. Which term describes programs used to control access to computer resources, enforce policies, audit usage, and provide billing information? Traffic congestion Certificate authority (... CA) Authentication, authorization, and accounting (AAA) services Trusted roots list 5.00000 points QUESTION 2 1. Which of the following refers to the malicious insertion of scripting code onto a vulnerable Web site? Insertion attack Upstream filtering Keystroke logger Cross-site scripting (XSS) 5.00000 points QUESTION 3 1. Which name is given to a VPN created between a client and a server either within the same local network or across a WAN link or intermediary network to support secure client interaction with the services of a resource host? Site-to-site VPN Software VPN Client-to-server VPN Keyspace 5.00000 points QUESTION 4 1. Which name is given to a rogue program that automatically dials a modem to a pre-defined number to auto-download additional malware to the victim or to upload stolen data from the victim? Adwar e Sector Spywar e Dialer 5.00000 points QUESTION 5 1. Which term describes a network, network link, or channel located between the endpoints of a VPN? One-way function Host-to-host network Site-to-site network Intermediary network 5.00000 points QUESTION 6 1. Which of the following is given to a software interface with a system that allows code execution? Intentional Electromagnetic Interference (IEMI) National Institute of Standards and Technology (NIST) Proxy Command shell 5.00000 points QUESTION 7 1. Which of the following terms describes hiding information from unauthorized third parties? Virtual Private Network (VPN) Split tunnel Cryptography Authentication, Authorization, and Accounting (AAA) Services 5.00000 points QUESTION 8 1. Which of the following is not a type of malware? Virus Worm Chip creep Trojan horse 5.00000 points QUEST ION 9 1. A dedicated connection is always off and available for immediate transmission of data only when there is an emergency. True False 5.00000 points QUESTION 10 1. Which term is a form of exploitation in which an unauthorized or rogue DNS server responds to DNS queries with false resolutions? DNS poisoning DNS spoofing Banner grabbing Dumpster diving 5.00000 points QUESTION 11 1. Which of the following us an intentional discharge made to damage or destroy electronic equipment ranging from cell phones to computers and servers? Session hijacking Virus Intentional electromagnetic interference (IEMI) Chip creep 5.00000 points QUESTION 12 1. Hashing verifies data integrity by using algorithms to produce unique numbers from datasets known as hash values. True False 5.00000 points QUESTION 13 1. Which term refers to a type of business telephone network? Private Branch Exchange (PBX) Host-to-site VPN Rekeying Virtual private network (VPN) 5.00000 points QUESTION 14 1. Which name is given to the information related to the owners and managers of a domain name accessed through the domain registrar’s Web sites and Whois lookups? Domain registration National Institute of Standards and Technology (NIST) USENET newsgroup Wrapper 5.00000 points QUESTION 15 1. Which term describes a form of security defense that focuses on discouraging a perpetrator with physical harm, social disgrace, and legal consequences? Buffer overflow Firewall Deterrent Dumpster diving 5.00000 points QUESTION 16 1. Which term is used to describe a feature added to the NTFS file system to support files from POSIX, OS/2, and Macintosh? Deterrent Adware Hierarchical file system (HFS) Alternate data stream (ADS) 5.00000 points QUESTION 17 1. A split tunnel is a VPN connection that allows simultaneous access to the secured VPN link and unsecured access to the Internet across the same connection. True False 5.00000 points QUESTION 18 1. Which term describes a VPN created between two individual hosts across a local or intermediary network? VPN appliance Host-to-host VPN Hash Site-to-site VPN 5.00000 points QUESTION 19 1. Which of the following is a form of exploitation in which the data on a DNS server is falsified so that subsequent responses to DNS resolution queries are incorrect? Dumpster diving DNS poisoning Banner grabbing Dialer 5.00000 points QUESTION 20 1. Reconnaissance is the act of learning as much as possible about a target before attempting attacks. True False [Show More]
Last updated: 2 years ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 09, 2022
Number of pages
5
Written in
This document has been written for:
Uploaded
Aug 09, 2022
Downloads
0
Views
104
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·