Term Definition
Cloud-based data storage was True
one of the first uses of cloud
computing.
True
False
Give this one a try later!
True False
2 of 430
Term Definition
Impersonation can be False
employed in online attacks.
,True
False
Give this one a try later!
True False
Correct definition
True
3 of 430
Term Definition
The tools in a social engineer's False
toolbox are based on a
sophisticated knowledge of
software and hardware.
True
False
Give this one a try later!
True False
4 of 430
Definition Term
TCP/IP hijacking
, The process of taking control of
an already existing session
between a client and a server is
known as __________.
TCP/IP hijacking
DNS kiting
smurfing
sniffing
Give this one a try later!
True False
5 of 430
Term Definition
What is an advantage of a host- It can reduce false-positive
based IDS? rates.
It can reduce false-positive
rates.
Its signatures are broader.
It can examine data before it is
decrypted.
It is inexpensive to maintain in
the enterprise.
Give this one a try later!
True False
, 6 of 430
Term Definition
ZigBee is a low-power, personal False
area networking technology
described by the IEEE 802.15.4
series.
True
False
Give this one a try later!
True False
Correct definition
True
7 of 430
Term Definition
Vulnerabilities are known True
entities; otherwise, the scanners
would not have the ability to
scan for them.
True
False
Give this one a try later!