Network Security| CSE 467/567 Fall semester Final
Exam
______ attempts to monopolize all of the available request handling threads on the
Web server by sending HTTP requests that never complete.
A. HTTP
B. Reflection attacks
C. SYN flooding
D. Slowloris - ANSW D. Slowloris
______ mode is typically used for a general-purpose block-oriented transmission
and is useful for high-speed requirements.
A. ECB B. OFB
C. CFB D. CTR - ANSW D. CTR
______ relates to the capacity of the network links connecting a server to the wider
Internet.
A. Application resource
B. Network bandwidth
C. System payload
,D. Directed broadcast - ANSW B. Network bandwidth
_______ is a text-based protocol with a syntax similar to that of HTTP.
A. RIP
B. DIP
C. SIP
D. HIP - ANSW C. SIP
________ assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the
system.
A. System Integrity
B. Data Integrity
C. Availability
D. Confidentiality - ANSW A. System Integrity
_________ are analogous to a burglar guessing a safe combination by observing
how long it takes to turn the dial from number to number.
A. Digital standards B. Mathematical attacks
C. Ciphers D. Timing attacks - ANSW D. Timing attacks
_________ are either individuals or members of a larger group of outsider
attackers who are motivated by social or political causes.
A. State-sponsored organizations B. Activists
,C. Cyber criminals
D. Others - ANSW B. Activists
_________ attacks have several approaches, all equivalent in effort to factoring the
product of two primes.
A. Mathematical B. Brute-force
C. Chosen ciphertext D. Timing - ANSW A. Mathematical
_________ defines user authentication as "the process of verifying an identity
claimed by or for a system entity".
A. RFC 4949
B. RFC 2298
C. RFC 2493
D. RFC 2328 - ANSW A. RFC 4949
_________ involves the collection of data relating to the behavior of legitimate
users over a period of time.
A. Profile based detection
B. Signature detection
C. Threshold detection
D. Anomaly detection - ANSW D. Anomaly detection
_________ is a document that describes the application level protocol for
exchanging data between intrusion detection entities.
A. RFC 4767
, B. RFC 4766
C. RFC 4765
D. RFC 4764 - ANSW A. RFC 4767
_________ is the original message or data that is fed into the algorithm as input.
A. Plaintext B. Encryption algorithm
C. Decryption algorithm D. Ciphertext - ANSW A. Plaintext
__________ allows an issuer to access regional and national networks that connect
point of sale devices and bank teller machines worldwide.
A. EFT
B. POS
C. BTM
D. ATF - ANSW A. EFT
__________ are used to send large volumes of unwanted e-mail.
A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooters - ANSW B. Spammer programs
__________ assures that individuals control or influence what information related
to them may be collected and stored and by whom and to whom that information
may be disclosed.
A. Availability
B. System Integrity
Exam
______ attempts to monopolize all of the available request handling threads on the
Web server by sending HTTP requests that never complete.
A. HTTP
B. Reflection attacks
C. SYN flooding
D. Slowloris - ANSW D. Slowloris
______ mode is typically used for a general-purpose block-oriented transmission
and is useful for high-speed requirements.
A. ECB B. OFB
C. CFB D. CTR - ANSW D. CTR
______ relates to the capacity of the network links connecting a server to the wider
Internet.
A. Application resource
B. Network bandwidth
C. System payload
,D. Directed broadcast - ANSW B. Network bandwidth
_______ is a text-based protocol with a syntax similar to that of HTTP.
A. RIP
B. DIP
C. SIP
D. HIP - ANSW C. SIP
________ assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the
system.
A. System Integrity
B. Data Integrity
C. Availability
D. Confidentiality - ANSW A. System Integrity
_________ are analogous to a burglar guessing a safe combination by observing
how long it takes to turn the dial from number to number.
A. Digital standards B. Mathematical attacks
C. Ciphers D. Timing attacks - ANSW D. Timing attacks
_________ are either individuals or members of a larger group of outsider
attackers who are motivated by social or political causes.
A. State-sponsored organizations B. Activists
,C. Cyber criminals
D. Others - ANSW B. Activists
_________ attacks have several approaches, all equivalent in effort to factoring the
product of two primes.
A. Mathematical B. Brute-force
C. Chosen ciphertext D. Timing - ANSW A. Mathematical
_________ defines user authentication as "the process of verifying an identity
claimed by or for a system entity".
A. RFC 4949
B. RFC 2298
C. RFC 2493
D. RFC 2328 - ANSW A. RFC 4949
_________ involves the collection of data relating to the behavior of legitimate
users over a period of time.
A. Profile based detection
B. Signature detection
C. Threshold detection
D. Anomaly detection - ANSW D. Anomaly detection
_________ is a document that describes the application level protocol for
exchanging data between intrusion detection entities.
A. RFC 4767
, B. RFC 4766
C. RFC 4765
D. RFC 4764 - ANSW A. RFC 4767
_________ is the original message or data that is fed into the algorithm as input.
A. Plaintext B. Encryption algorithm
C. Decryption algorithm D. Ciphertext - ANSW A. Plaintext
__________ allows an issuer to access regional and national networks that connect
point of sale devices and bank teller machines worldwide.
A. EFT
B. POS
C. BTM
D. ATF - ANSW A. EFT
__________ are used to send large volumes of unwanted e-mail.
A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooters - ANSW B. Spammer programs
__________ assures that individuals control or influence what information related
to them may be collected and stored and by whom and to whom that information
may be disclosed.
A. Availability
B. System Integrity