subject
Engineering, 31.12.2019 00:31 javonteoshamccaliste

Ssl/tls is used for

any application

web applications

both a and b

neither a nor b

small malware programs that download larger malware programs are called

scouts

downloaders

foothold programs

stage-one programs

single network addresses in different single networks are

unique if the two single networks use the same technology standard

unique

both a and b

neither a nor b

converting application messages into bits is called

encoding

encryption

exchange

encapsulation

guarantees by a provider to meet certain delivery quality specifications are called

speed quality guarantees

service warranties

service level agreements

contracts

advanced persistent threats are

extremely dangerous for the victim

inexpensive for the attacker

both a and b

neither a nor b

in antivirus filtering, the best ways to filter currently use

stateful inspection

behavioral detection

signature detection

application awareness

the general name for malware on a user's pc that collects sensitive information and sends this information to an attacker is

spyware

anti-privacy software

keystroke loggers

data mining software

firewall log files should be read

every week

every day

every month

usually only when a serious attack is suspected

when a firewall identifies an attack packet, it

discards the packet

copies information about the packet into a log file

both a and b

neither a nor b

who are the most dangerous types of employees?

it security employees

former employees

financial employees

manufacturing employees

in authentication, the is the party trying to prove his or her identity.

true party

verifier

supplicant

all of the above

in a firewall, vpn traversal

increases the effectiveness of firewall filtering

reduces firewall filtering effectiveness

both a and b

neither a nor b

which of the following can spread more rapidly?

directly-propagating viruses

directly-propagating worms

both of the above can spread with approximately equal speed.

the udp

has a checksum field

is unreliable

both a and b

neither a nor b

an iaas provides

application programs

servers

both a and b

neither a nor b

host p transmits a syn segment to host q. if host q is willing to open the connection, it will transmit a(n) segment.

syn

ack

syn/ack

none of the above

which of the following can be upgraded after it is installed on a victim computer? (choose the most specific answer.)

trojan horses

worms

viruses

bots

what type of attacker are most of attackers today?

disgruntled employees and ex-employees

cyberterrorists

career criminals

hackers motivated by a sense of power

802.11 data link layer standards govern

access point operation

frame organization

both a and b

neither a nor b

credit card number thieves are called (pick the most precise answer.)

identity thieves

numbers racketeers

fraudsters

carders

using encryption, you make it impossible for attackers to read your messages even if they intercept them. this is

authentication

confidentiality

both a and b

neither a nor b

look at and look at

antivirus programs, packets, firewalls, files

antivirus programs, packets, firewalls, packets

antivirus programs, files, firewalls, packets

antivirus programs, files, firewalls, files

iris scanning is attractive because of its

precision

low cost

both a and b

neither a nor b

the source socket is 60.171.18.22: 57707. the source is a(n)

ephemeral server

well-known server

server

client

ansver
Answers: 1

Another question on Engineering

question
Engineering, 04.07.2019 19:10
How to increase the thermal officiency of an ideal simple rankino cycle? among these methods, which one is the best and why?
Answers: 2
question
Engineering, 04.07.2019 19:20
Determine the time of the day and month of the year at which the peak sensible cooling load occurs for a top floor, north-eastern corner room of an office building in durban for the following conditions: floor area: 8 x 8 x 3 m east and north walls: 115 mm face brick (outside), 20 mm air space, 115 mm ordinary brick (inside) with 15 mm plaster roof construction: suspended plasterboard ceiling, 450 mm air space, 150 mm concrete, 75mm screed, waterproofing no heat transfer across other surfaces window area 3x 1,5 m high in north wall only. ordinary glass with venetian blinds. lights and occupants : from 07: 00 to 18: 00 average light density: 25 w/m2 number of occupants : 5 seated, light office work room temperature 24°c
Answers: 3
question
Engineering, 04.07.2019 19:20
The quality is zero at a)-the saturated vapour state b)-the saturated liquid state c)-the saturated liquid-vapour mixture state d)-none of the states in the other answers
Answers: 3
question
Engineering, 04.07.2019 19:20
Apiping systems consists of 6 m of 6-std type k and 12 m of 4-std type k, both drawn copper tubing. the system conveys ethylene glycol at a rate of 0.013 m3/s. the pressure drop across the system is to be calculated. there are two 90° elbows in the 6-in pipe, a reduction from the 6-in pipe to the 4-in pipe and four 90° elbows in the 4-in pipe. all fittings are soldered (same as flanged) and regular. the inlet and outlet of the system are at the same height.
Answers: 1
You know the right answer?
Ssl/tls is used for

any application

web applications

both a and...
Questions
question
Social Studies, 30.07.2019 19:00
question
Advanced Placement (AP), 30.07.2019 19:00
Questions on the website: 13722367