Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ENG 01N FA3 Nova Southeastern University /Questions With Solutions

Rating
-
Sold
-
Pages
164
Grade
A+
Uploaded on
21-10-2022
Written in
2022/2023

ENG 01N FA3 Nova Southeastern University /Questions With Solutions

Institution
Course

Content preview

 Question 1
0.6 out of 0.6 points
Which of the following refers to a communication pathway, circuit, or frequency
dedicated or reserved for a specific transmission?
Selected
Answer:
Channel
Answers: Hardware VPN
Host-to-site VPN
Asymmetric cryptography

Channel
 Question 2
0.6 out of 0.6 points
Which term describes a network, network link, or channel located between the
endpoints of a VPN?
Selected
Answer:
Intermediary
network
Answers: One-way function
Host-to-host network
Site-to-site network

Intermediary
network
 Question 3
0.6 out of 0.6 points
Which of the following characteristics describes an edge router?
Selected
Answer:
The last device owned and controlled by an organization before an
ISP or telco connection
Answers:
The last device owned and controlled by an organization before an
ISP or telco connection
A form of VPN establishing a secure VPN over trusted VPN
connections
A form of cryptography in which each encryption key is used once
before being discarded

, A security service that ensures that a sender cannot deny sending a
message
 Question 4
0.6 out of 0.6 points
Which of the following refers to a form of IDS/IPS detection based on a recording of
real-world traffic as a baseline for normal?
Selected
Answer:
Behavioral-based detection
Answers: Knowledge-based detection
Signature-based detection
Anomaly-based detection

Behavioral-based detection
 Question 5
0.6 out of 0.6 points
Which name is given to a probability prediction based on statistics and historical
occurrences on the likelihood of how many times in the next year a threat is going to
cause harm?
Selected
Answer:
Annualized rate of occurrence (ARO)
Answers: Tunnel mode encryption
Physical address

Annualized rate of occurrence (ARO)
Rule
 Question 6
0.6 out of 0.6 points
Which of the following is a technique for storing or copying log events to a
centralized logging server?
Selected
Answer:
Syslog
Answers:
Syslog
Write-once read-many (WORM) storage
Unified Threat Management (UTM)
Firewall logging
 Question 7

, 0.6 out of 0.6 points
Which of the following refers to a type of software product that is pre-compiled and
whose source code is undisclosed?
Selected
Answer:
Closed source
Answers: Circuit

Closed source
Bots
Physical address
 Question 8
0.6 out of 0.6 points
Which of the following refers to a network access control or admission control (NAC)
used on individual network access devices such as firewalls, VPN gateways, and
wireless routers to offload authentication to a dedicated authentication
server/service?
Selected
Answer:
Port-based network access (admission) control (PNAC)
Answers:
Port-based network access (admission) control (PNAC)
Database-based detection
Management interface
Access control list (ACL)
 Question 9
0.6 out of 0.6 points
Which name is given to a hacking technique used against static packet filtering
firewalls to discover the rules or filters controlling inbound traffic?
Selected
Answer:
Firewalking
Answers: Filter
Signature-based detection

Firewalking
Database-based detection
 Question 10
0.6 out of 0.6 points
Which term describes the cumulative value of an asset based on both tangible and

, intangible values?
Selected
Answer:
Asset value (AV)
Answers:
Asset value (AV)
Exposure factor (EF)
Single loss expectancy (SLE)
Packet
 Question 11
0.6 out of 0.6 points
Which of the following describes an access control list (ACL)?
Selected
Answer:
A mechanism that defines traffic or an event to apply an authorization
control of allow or deny against
Answers:
A mechanism that defines traffic or an event to apply an authorization
control of allow or deny against
An intrusion detection system/intrusion prevention system (IDS/ IPS)
based on a defined normal, often defined using rules similar to firewall
rules
An event that does not trigger an alarm but should have, due to the
traffic or event actually being abnormal and/or malicious
A form of IDS/IPS detection based on a collection of samples, patterns,
signatures, and so on
 Question 12
0.6 out of 0.6 points
Which of the following is a malicious software program distributed by a hacker to
take control of a victim’s computers?
Selected
Answer:
Agent
Answers: Sacrificial host
Client
Server

Agent
 Question 13
0.6 out of 0.6 points

Written for

Course

Document information

Uploaded on
October 21, 2022
Number of pages
164
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$26.08
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ethanhope Chamberlain College Of Nursng
Follow You need to be logged in order to follow users or courses
Sold
99
Member since
5 year
Number of followers
97
Documents
2789
Last sold
11 months ago

4.4

20 reviews

5
15
4
2
3
0
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions