) Questions & Answers {Grade
A} 100% Correct
Anonymity (Network Vulnerabilities) - correct answer an attacker can attempt many
attacks, anonymously, from thousands of miles away
Many points of attack (Network Vulnerabilities) - correct answer Large networks
mean many points of potential entry
Sharing (Network Vulnerabilities) - correct answer Networked systems open up
potential access to more users than do single computers
System complexity (Network Vulnerabilities) - correct answer one system is complex
and hard to protect; networks of many systems are much harder to protect
,Unknown Perimeter (Network Vulnerabilities) - correct answer large networks change
all the time, so it is hard to tell which ones belong and which are bridge networks
Unknown Path (Network Vulnerabilities) - correct answer many paths, including
untrustworthy ones, from one host to another
A ______ attack involves an adversary repeating a previously captured user response.
A. eavesdropping
B. replay
C. client
D. Trojan horse - correct answer B. Replay
A flaw or weakness in a system's design, implementation, or operation and
management that could be exploited to violate the system's security policy is a/an
_____________________.
, A. Countermeasure
B. Vulnerability
C. Risk
D. Adversary - correct answer B. Vulnerability
Digital signatures and key management are the two most important applications of
__________ encryption.
A. Preimage Resistant
B. Public Key
C. Private Key
D. Advanced - correct answer Public Key
Security concerns that result from the use of virtualized systems include ______.
A. Guest OS isolation