Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Network Security| CSE 467/567 Fall semester Final Exam

Rating
-
Sold
-
Pages
47
Grade
A+
Uploaded on
01-02-2024
Written in
2023/2024

Network Security| CSE 467/567 Fall semester Final Exam

Institution
Course

Content preview

Network Security| CSE 467/567 Fall semester Final
Exam


______ attempts to monopolize all of the available request handling threads on the
Web server by sending HTTP requests that never complete.


A. HTTP
B. Reflection attacks
C. SYN flooding
D. Slowloris - ANSW D. Slowloris


______ mode is typically used for a general-purpose block-oriented transmission
and is useful for high-speed requirements.


A. ECB B. OFB
C. CFB D. CTR - ANSW D. CTR


______ relates to the capacity of the network links connecting a server to the wider
Internet.


A. Application resource
B. Network bandwidth
C. System payload

,D. Directed broadcast - ANSW B. Network bandwidth


_______ is a text-based protocol with a syntax similar to that of HTTP.


A. RIP
B. DIP
C. SIP
D. HIP - ANSW C. SIP


________ assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the
system.
A. System Integrity
B. Data Integrity
C. Availability
D. Confidentiality - ANSW A. System Integrity


_________ are analogous to a burglar guessing a safe combination by observing
how long it takes to turn the dial from number to number.


A. Digital standards B. Mathematical attacks
C. Ciphers D. Timing attacks - ANSW D. Timing attacks


_________ are either individuals or members of a larger group of outsider
attackers who are motivated by social or political causes.


A. State-sponsored organizations B. Activists

,C. Cyber criminals
D. Others - ANSW B. Activists


_________ attacks have several approaches, all equivalent in effort to factoring the
product of two primes.
A. Mathematical B. Brute-force
C. Chosen ciphertext D. Timing - ANSW A. Mathematical


_________ defines user authentication as "the process of verifying an identity
claimed by or for a system entity".
A. RFC 4949
B. RFC 2298
C. RFC 2493
D. RFC 2328 - ANSW A. RFC 4949


_________ involves the collection of data relating to the behavior of legitimate
users over a period of time.


A. Profile based detection
B. Signature detection
C. Threshold detection
D. Anomaly detection - ANSW D. Anomaly detection


_________ is a document that describes the application level protocol for
exchanging data between intrusion detection entities.


A. RFC 4767

, B. RFC 4766
C. RFC 4765
D. RFC 4764 - ANSW A. RFC 4767


_________ is the original message or data that is fed into the algorithm as input.


A. Plaintext B. Encryption algorithm
C. Decryption algorithm D. Ciphertext - ANSW A. Plaintext


__________ allows an issuer to access regional and national networks that connect
point of sale devices and bank teller machines worldwide.
A. EFT
B. POS
C. BTM
D. ATF - ANSW A. EFT


__________ are used to send large volumes of unwanted e-mail.
A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooters - ANSW B. Spammer programs


__________ assures that individuals control or influence what information related
to them may be collected and stored and by whom and to whom that information
may be disclosed.
A. Availability
B. System Integrity

Written for

Course

Document information

Uploaded on
February 1, 2024
Number of pages
47
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
2 weeks ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions