Telecommunication and Information Technology > QUESTIONS & ANSWERS > University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 3 & 4 Q (All)

University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 3 & 4 Quiz. 20 Q&A

Document Content and Description Below

QUESTION 1 1. Which term describes programs used to control access to computer resources, enforce policies, audit usage, and provide billing information? Traffic congestion Certificate authority (... CA) Authentication, authorization, and accounting (AAA) services Trusted roots list 5.00000 points QUESTION 2 1. Which of the following refers to the malicious insertion of scripting code onto a vulnerable Web site? Insertion attack Upstream filtering Keystroke logger Cross-site scripting (XSS) 5.00000 points QUESTION 3 1. Which name is given to a VPN created between a client and a server either within the same local network or across a WAN link or intermediary network to support secure client interaction with the services of a resource host? Site-to-site VPN Software VPN Client-to-server VPN Keyspace 5.00000 points QUESTION 4 1. Which name is given to a rogue program that automatically dials a modem to a pre-defined number to auto-download additional malware to the victim or to upload stolen data from the victim? Adwar e Sector Spywar e Dialer 5.00000 points QUESTION 5 1. Which term describes a network, network link, or channel located between the endpoints of a VPN? One-way function Host-to-host network Site-to-site network Intermediary network 5.00000 points QUESTION 6 1. Which of the following is given to a software interface with a system that allows code execution? Intentional Electromagnetic Interference (IEMI) National Institute of Standards and Technology (NIST) Proxy Command shell 5.00000 points QUESTION 7 1. Which of the following terms describes hiding information from unauthorized third parties? Virtual Private Network (VPN) Split tunnel Cryptography Authentication, Authorization, and Accounting (AAA) Services 5.00000 points QUESTION 8 1. Which of the following is not a type of malware? Virus Worm Chip creep Trojan horse 5.00000 points QUEST ION 9 1. A dedicated connection is always off and available for immediate transmission of data only when there is an emergency. True False 5.00000 points QUESTION 10 1. Which term is a form of exploitation in which an unauthorized or rogue DNS server responds to DNS queries with false resolutions? DNS poisoning DNS spoofing Banner grabbing Dumpster diving 5.00000 points QUESTION 11 1. Which of the following us an intentional discharge made to damage or destroy electronic equipment ranging from cell phones to computers and servers? Session hijacking Virus Intentional electromagnetic interference (IEMI) Chip creep 5.00000 points QUESTION 12 1. Hashing verifies data integrity by using algorithms to produce unique numbers from datasets known as hash values. True False 5.00000 points QUESTION 13 1. Which term refers to a type of business telephone network? Private Branch Exchange (PBX) Host-to-site VPN Rekeying Virtual private network (VPN) 5.00000 points QUESTION 14 1. Which name is given to the information related to the owners and managers of a domain name accessed through the domain registrar’s Web sites and Whois lookups? Domain registration National Institute of Standards and Technology (NIST) USENET newsgroup Wrapper 5.00000 points QUESTION 15 1. Which term describes a form of security defense that focuses on discouraging a perpetrator with physical harm, social disgrace, and legal consequences? Buffer overflow Firewall Deterrent Dumpster diving 5.00000 points QUESTION 16 1. Which term is used to describe a feature added to the NTFS file system to support files from POSIX, OS/2, and Macintosh? Deterrent Adware Hierarchical file system (HFS) Alternate data stream (ADS) 5.00000 points QUESTION 17 1. A split tunnel is a VPN connection that allows simultaneous access to the secured VPN link and unsecured access to the Internet across the same connection. True False 5.00000 points QUESTION 18 1. Which term describes a VPN created between two individual hosts across a local or intermediary network? VPN appliance Host-to-host VPN Hash Site-to-site VPN 5.00000 points QUESTION 19 1. Which of the following is a form of exploitation in which the data on a DNS server is falsified so that subsequent responses to DNS resolution queries are incorrect? Dumpster diving DNS poisoning Banner grabbing Dialer 5.00000 points QUESTION 20 1. Reconnaissance is the act of learning as much as possible about a target before attempting attacks. True False [Show More]

Last updated: 2 years ago

Preview 1 out of 5 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

104
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 09, 2022

Number of pages

5

Written in

Seller


seller-icon
Kirsch

Member since 5 years

941 Documents Sold

Reviews Received
111
37
8
4
28
Additional information

This document has been written for:

Uploaded

Aug 09, 2022

Downloads

 0

Views

 104

Document Keyword Tags


$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·