A ping sweep
[pic][pic]A) Sends ICMP echo requests to the target machine
[pic][pic]B) Is an exploit that creates a denial of service (DoS) using ICMP echo requests
[pic][pic]C) Is a system of clearing your network
[pic][pic]D) Determines what services are running on a system
[pic]
|Points pull in: |1.0/1.0 |
| determine Answer(s): |A |
[pic]
[pic][pic][pic]
2.
What is an unstructured threat?
[pic][pic]A) An fervency that is uncoordinated, nonspecific, and lasts a short amount of time
[pic][pic]B) An elite hacker who mounts an approach against a specific target
[pic][pic]C) A poorly engineered building
[pic][pic]D) A fibre of malicious code that formats the hard drive on a computer.
[pic]
|Points Earned: |1.0/1.0 |
|Correct Answer(s): |A |
[pic]
[pic][pic][pic]
3.
In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.
[pic]
|Points Earned: |1.0/1.0 |
|Correct Answer(s): |Fiber cable |
[pic]
[pic][pic][pic]
4.
A successful approach path on a network may adversely equal security in all the following ways leave off:
[pic][pic]A) Loss of confidentiality
[pic][pic]B) Loss of integrity
[pic][pic]C) Loss of functionality
[pic][pic]D) Loss of availability
[pic]
|Points Earned: |1.0/1.0 |
|Correct Answer(s): |C |
[pic]
[pic][pic][pic]
5.
Which of the following is not one of the three worldwide methods used in authentication?
[pic][pic]A) Something you do
[pic][pic]B) Something you have
[pic][pic]C) Something you are
[pic][pic]D) Something you know
[pic]
|Points Earned: |1.0/1.0 |
|Correct Answer(s): |A |
[pic]
[pic][pic][pic]
6.
Authentication means that the person who sends and e-mail will be unable to deny sending the e-mail.
[pic][pic]A) True
[pic][pic]B) False
[pic]...If you want to get a full essay, order it on our website: Ordercustompaper.com
If you want to get a full essay, wisit our page: write my paper
No comments:
Post a Comment