網路入侵偵測

75 | Attempts: 126
Please wait...

Question 1 / 76
🏆 Rank #--
Score 0/100

1. ____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities

Submit
Please wait...
About This Quiz
網路入侵偵測 - Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. A ___________ is a private network of computers that uses the public Internet to connect some nodes.

Submit

3. ______________ refers to a kind of electronic civil disobedience in which activists take direct action by breaking into, or protesting, government or corporate computer systems

Submit

4. An ____________ gathers and analyzes information from various areas within a computer, or network, in order to identify possible violations of security policy, including unauthorized access, as well as misuse.

Submit

5. ______________ refers to the pre-attack phase when the attacker scans the network with specific information gathered during reconnaissance.

Submit

6. ________________ can be said to be a security violation that results from a threat action.

Submit

7. The BIOS program is usually in the _______memory location

Submit

8. The __________ is a semi-trusted network zone that separates the untrusted Internet from the company's trusted internal network.

Submit

9. The authentication process is done by exchanging a set of messages between a pair of entities, usually called as an _________________ protocol.

Submit

10. ____________ of the e-mail message has key role to play in e-mail tracing as it contains the unique IP address of the server that sent the message.

Submit

11. HPFS is acronym for___________

Submit

12. Choose the most appropriate definition for Cybercrime. Cybercrime is defined as…

Submit

13. The ___________ is a unique identifier that is used to establish, and maintain, wireless connectivity and acts as a single shared password between access points and clients.

Submit

14. ________ is a program and/or device that monitors data traveling over a network.

Submit

15. RADIUS, TACAS, IKE are _________

Submit

16. The objective of ______________ is to authenticate based on username, password, smart cards, tokens or PINs.

Submit

17. In a ____________________, the IDS examine activity on each individual computer or host.

Submit

18. __________ is the technique attackers use to gain access to a network, sending messages to a computer with an IP address indicating that the message is coming from a trusted host.

Submit

19. E-mail crime can be categorized in two ways: one committed by sending mails and other _______

Submit

20. Which options should be turned on in a wireless network to make it more secure?

Submit

21. __________ is the act of obtaining unauthorized access to a network by manipulating authorized users in to revealing their passwords and access information

Submit

22. The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed over several machines

Submit

23. _________ is a program that appears to be legitimate but is designed to have destructive effects.

Submit

24. ____________ defines the way in which messages are transmitted over the Internet.

Submit

25. __________ is the art and science of hiding information by embedding messages within other, seemingly harmless messages.

Submit

26. IPSec aids two encryption modes:

Submit

27. Running a program that remotely finds ports opened and closed on remote systems, represents one of the most common types of __________attacks.

Submit

28. __________ is a system integrity check tool.

Submit

29. Logs can help in event reconstruction as they are_______

Submit

30. When there is sufficient power the computer looks for the ______for the start of the BIOS boot program.

Submit

31. ___________ is a computer that is completely vulnerable to attacks.

Submit

32. ____________ is a proxy server that doesn't have special caching abilities of a caching HTTP proxy server.

Submit

33. A _____________ is an application program that is used to identify an unknown or forgotten password to a computer or network resource.

Submit

34. _______________ refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of attack prior to launching an attack.

Submit

35. Investigators must document digital evidence by creating an _________________

Submit

36. A __________ is simply a program, or hardware device, that protects the resources of a private network from users on other networks.

Submit

37. _____________ detects and drops packets that overload the server

Submit

38. Common digital signature algorithms that are used include ______

Submit

39. In a ____________________, the IDS examine activity on each individual computer or host.

Submit

40. A ___________is any circumstance or event that has the potential to cause harm to a system or network

Submit

41. Any ____________involves three phases – preparation, conduct and conclusion.

Submit

42. ____________should begin with the identification of audience and objective of the particular report Report writing

Submit

43. ______ is defined as the protection of networks and their services from unauthorized modification, destruction, or disclosure.

Submit

44. _____________ layer deals with the mechanical, electrical, procedural interfaces and the physical transmission medium.

Submit

45. ___________ is a defined way to breach the security of an IT system through vulnerability.

Submit

46. A ____________ indicates successful access gained by the user and __________ stands for the unsuccessful attempt made to gain the access.

Submit

47. __________ is a means for ensuring private, secure communication between hosts over an insecure medium using tunneling.

Submit

48. During the power on self-test various tests are performed including:

Submit

49. The basic function of ___________is transmission of data over the communication channel.

Submit

50. ___________ is an incident process in which a person or software program acting on behalf of any other person takes some action and then denies them to do it later.

Submit

51. An ______________is a person who can investigate on a particular case, evaluate all findings, and educate the jury about his findings.

Submit

52. _______ is a malicious program that replicates it self until it fills all of the storage space on a drive or network

Submit

53. Cyber Crime is divided into the two T's

Submit

54. ______________are those that violate the confidentiality without affecting the state of the system.

Submit

55. _____________ monitors system files to determine whether an intruder has changed the system files.

Submit

56. __________ has been defined as an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.

Submit

57. ______ is an online utility that helps an investigator/user to search for copyright records

Submit

58. ___________ contain events generated by system component and deals with driver failures and hardware issues.

Submit

59. The computer forensic investigator must maintain ___________whenever a case is being investigated.

Submit

60. ___________is a file system designed specifically for the OS/2 operating system to improve upon the limitations of the FAT file system.

Submit

61. An ________can be an event or set of events that threatens the security in computing systems and networks in any organization.

Submit

62. ___________ is also known as misuse detection and tries to identify events that misuse a system.

Submit

63. Network forensics poses greater challenges as:

Submit

64. Proxy based firewalls concentrate on the _____________ rather than just the packets

Submit

65. WEP stands for ____________

Submit

66. ___________ is a computer program that is designed to replicate itself by copying itself into the other programs stored in a computer

Submit

67. ________ is a procedure by which a router changes data in packets to modify the network addresses

Submit

68. _______________firewalls concentrates on individual packets and analyzes their header information and which way they are directed to

Submit

69. ______ is a standard for encrypting and digitally signing electronic mail that contains attachments and for offering secure data transmissions.

Submit

70. The __________________ characterizes the organization's idea of an apt computer, usage of the network and measures to deal with the network incidents.

Submit

71. _________ determines what type of resources can be accessed per user basis.

Submit

72. _____________ is an incident in which a system does not behave as it was expected to.

Submit

73. __________ mainly involve government agencies that are responsible for criminal investigations and prosecution.

Submit

74. _________ is a program that handles external servers on behalf of internal servers.

Submit

75. Computer crimes pose certain challenges to solving the crime. These include:

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (75)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
____________ is used to describe those hackers who use their computer...
A ___________ is a private network of computers that uses the public...
______________ refers to a kind of electronic civil disobedience in...
An ____________ gathers and analyzes information from various areas...
______________ refers to the pre-attack phase when the attacker scans...
________________ can be said to be a security violation that results...
The BIOS program is usually in the _______memory location
The __________ is a semi-trusted network zone that separates the...
The authentication process is done by exchanging a set of messages...
____________ of the e-mail message has key role to play in e-mail...
HPFS is acronym for___________
Choose the most appropriate definition for Cybercrime. Cybercrime is...
The ___________ is a unique identifier that is used to establish, and...
________ is a program and/or device that monitors data traveling over...
RADIUS, TACAS, IKE are _________
The objective of ______________ is to authenticate based on username,...
In a ____________________, the IDS examine activity on each individual...
__________ is the technique attackers use to gain access to a network,...
E-mail crime can be categorized in two ways: one committed by sending...
Which options should be turned on in a wireless network to make it...
__________ is the act of obtaining unauthorized access to a network by...
The most damaging of the denial of service attacks can be a...
_________ is a program that appears to be legitimate but is designed...
____________ defines the way in which messages are transmitted over...
__________ is the art and science of hiding information by embedding...
IPSec aids two encryption modes:
Running a program that remotely finds ports opened and closed on...
__________ is a system integrity check tool.
Logs can help in event reconstruction as they are_______
When there is sufficient power the computer looks for the ______for...
___________ is a computer that is completely vulnerable to attacks.
____________ is a proxy server that doesn't have special caching...
A _____________ is an application program that is used to identify an...
_______________ refers to the preparatory phase where an attacker...
Investigators must document digital evidence by creating an...
A __________ is simply a program, or hardware device, that protects...
_____________ detects and drops packets that overload the server
Common digital signature algorithms that are used include ______
In a ____________________, the IDS examine activity on each individual...
A ___________is any circumstance or event that has the potential to...
Any ____________involves three phases – preparation, conduct and...
____________should begin with the identification of audience and...
______ is defined as the protection of networks and their services...
_____________ layer deals with the mechanical, electrical, procedural...
___________ is a defined way to breach the security of an IT system...
A ____________ indicates successful access gained by the user and...
__________ is a means for ensuring private, secure communication...
During the power on self-test various tests are performed including:
The basic function of ___________is transmission of data over the...
___________ is an incident process in which a person or software...
An ______________is a person who can investigate on a particular case,...
_______ is a malicious program that replicates it self until it fills...
Cyber Crime is divided into the two T's
______________are those that violate the confidentiality without...
_____________ monitors system files to determine whether an intruder...
__________ has been defined as an assault on system security that...
______ is an online utility that helps an investigator/user to search...
___________ contain events generated by system component and deals...
The computer forensic investigator must maintain ___________whenever a...
___________is a file system designed specifically for the OS/2...
An ________can be an event or set of events that threatens the...
___________ is also known as misuse detection and tries to identify...
Network forensics poses greater challenges as:
Proxy based firewalls concentrate on the _____________ rather than...
WEP stands for ____________
___________ is a computer program that is designed to replicate itself...
________ is a procedure by which a router changes data in packets to...
_______________firewalls concentrates on individual packets and...
______ is a standard for encrypting and digitally signing electronic...
The __________________ characterizes the organization's idea of an apt...
_________ determines what type of resources can be accessed per user...
_____________ is an incident in which a system does not behave as it...
__________ mainly involve government agencies that are responsible for...
_________ is a program that handles external servers on behalf of...
Computer crimes pose certain challenges to solving the crime. These...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!