Devry SEC 360 Week 7 Quiz Latest

$14

Description

Devry SEC 360 Week 7 Quiz Latest

(TCO 10) Secure hashing is also known as _____.

public-key cryptography

a message digest

Transport Layer Security

Secure Sockets Layer

IPSec

Instructor Explanation: Week 6 Lecture and page 239 of course text

Points Received: 5 of 5

Comments:

Question 2. Question :

(TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

AES

RSA

Diffie Hellman

IN MD5

PSA

Instructor Explanation: Week 6 Lecture and pages 244-245 of course text

Points Received: 0 of 5

Comments:

Question 3. Question :

(TCO 11) Firewalls do not _____.

block unauthorized traffic

detect tampering

use simple software

filter words or phrases in traffic

enforce a security policy

Instructor Explanation: Week 6 Lecture and pages 275-279 of course text

Points Received: 0 of 5

Comments:

Question 4. Question :

(TCO 11) Which of the following is not a characteristic of a proxy server?

Configured to allow access only to specific systems

Maintains detailed audit information

Dependent on all other proxies on the bastion host

Runs as a nonprivileged user

Any service that is not supported by the proxy server is blocked.

Instructor Explanation: Page 273 of course text and Week 6 Lecture

Points Received: 5 of 5

Comments:

Question 5. Question :

(TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

software

remote procedure calls

agent technology

common interfaces

access to local audit records

Instructor Explanation: (Week 7 Lecture) Distributed agent technology with a central management module is most common.

Points Received: 0 of 5

Comments:

Question 6. Question :

(TCO 12) A decoy used to lure intruders into staying around is called a(n) _____.

pharm

phish

entrapment

honeypot

mug of ale

Instructor Explanation: (Week 7 Lecture) A honeypot is a decoy to capture the attention of intruders. A mug of ale might work, but that is not software!

Points Received: 5 of 5

Comments:

Question 7. Question :

(TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____.

drive-by attack

proxy-server attack

data-driven attack

penetration testing

steganography

Instructor Explanation: Page 271 of course text

Points Received: 5 of 5

Comments:

Question 8. Question :

(TCO 13) Which form of malware is dependent on operating systems and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

Instructor Explanation: Week 7 Lecture and page 304 of course text

Points Received: 5 of 5

Comments:

Question 9. Question :

(TCO 13) Which phase of the SDLC should have security representation?

Concept definition

Requirements definition

Design

Test and Evaluation

All phases

Instructor Explanation: Week 7 Lecture and page 307 of course text

Points Received: 5 of 5

Comments:

Question 10. Question :

(TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work?

Trap door

Virus

Worm

Trojan horse

Logic bomb

Instructor Explanation: Page 304 of course text

Points Received: 5 of 5

Comments:

* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)

DeVry Courses helps in providing the best essay writing service. If you need 100% original papers for Devry SEC 360 Week 7 Quiz Latest, then contact us through call or live chat.

Devry SEC 360 Week 7 Quiz Latest

Best Devry SEC 360 Week 7 Quiz Latest
Devry SEC 360 Week 7 Quiz Latest

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Add to cart