A friend lends you the latest music CD he just purchased. You take it...
Vulnerability is defined as a way that an
...
A closed port responds to a SYN Packet with a(n) ___packet
...
Physical dangers - i.e. earthquakes, flooding - are not considered a...
It is possible to capture packets that are not
...
In security environments, Authentication refers to:
Packet sniffers cannot read / interpret the
...
Which one of the following is NOT a fundamental principle of the...
The ICMP protocol is specifically designed to:
...
A threat becomes a risk only when it is
...
A ___ attaches itself to a program or file so it can spread from one...
It is not possible to map out a network, its
...
Of all the vulnerabilities listed below, which one is considered the...
___ reconnaissance is used by hackers for observing and learning about...
Which of the CIA Triad elements is responsible for ensuring that...
Which of the following command lines would you use to conduct a...
Computer A wishes to open a TCP session with Computer B. If Computer...
Which of the authentication methods below will
...
A weakness in a computer system, or a point where the system is...
Which of the following is NOT a security
...
IUA small company is looking to implement a protocol to exchange large...
Which of the following security goals provides a means for objective...
A security exploit is defined as:
1.
...
____ is a connectionless protocol
___ spread from computer to computer, but unlike the malware , it has...
John received an e-mail from Suzy, but he wants
...
Which of the tools below is designed as a vulnerability scanner?
Your system receives a few packets, but no connection seems to be...
When using a packet sniffer, what part(s) of the packet can you...
In the TCP/IP stack, the ____ layer is concerned with physically...
What security term, coined by the SANS institute, is used to represent...
Each TCP connection is uniquely identified by:
...
Which of the following software tools are not
...
Which of the following is information security
NOT concerned with?
You’ve captured a packet from the network using
...
The loss of one of the goals of security is known as a:
Security goals are a balancing act between 3 key elements. What are...
Which of the software tools below is considered an Intrusion Detection...
In order for a packet sniffer to work properly, it needs to put the...
The TCP three-way handshake used to open a TCP connection uses 3...
A fragmented IP datagram is reassembled by
Based on the highlighted portion of the captured packet code below,...
Which one of the following mechanisms can hackers
...
Which of the following is one method of gathering information about...
1.
...
Which of the CIA Triad elements is responsible for ensuring that...
In security environments, Accountability
means:
In security environments, Identification is
the process of:
Based on the highlighted portion of the captured packet code below,...
If you run password crackers or packet sniffers at work, which of the...
Based on the highlighted portion of the captured packet code below,...
___ is considered a high-end packet
...
The TCP three-way handshake used to close a TCP connection uses 3...
Which of the following statements about session hijacking is false?
Based on the highlighted portion of the captured packet code below,...
In Security term, Authorization refers to:
What are the elements that make up the Hacker’s
...
Captain Zap described the method he used to obtain user manuals to...
Which one of the following software tools
...
Qui
...
Define the term “Authorisation” as defined by Security principles
What was Captain Zap’s hack of the AT&T system? (What did he...
Define the concept of Least Privileges?
What are the 3 main types of security?