1. A ping sweep [pic][pic]A) Sends ICMP withdraw requests to the target railcar [pic][pic]B) Is an exploit that creates a denial of service (DoS) using ICMP echo requests [pic][pic]C) Is a system of clearing your meshing [pic][pic]D) Determines what services ar running on a system [pic] |Points pull in: |1.0/1.0 | | determine Answer(s): |A | [pic] [pic][pic][pic] 2. What is an unstructured threat? [pic][pic]A) An fervency that is uncoordinated, nonspecific, and lasts a short amount of time [pic][pic]B) An elite hacker who mounts an come near against a specific target [pic][pic]C) A poorly engineered build [pic][pic]D) A fibre of malicious code that formats the hard commence on a computer. [pic] |Points Earned: |1.0/1.0 | | determine Answer(s): |A | [pic] [pic][pic][pic] 3. In 2009 _______________ was cut and resulted in widespread p hone and Internet outages in the San Jose area of California. [pic] |Points Earned: |1.0/1.0 | |Correct Answer(s): |Fiber cable | [pic] [pic][pic][pic] 4.
A successful approach path on a network may adversely equal security in any the following ways leave off: [pic][pic]A) release of confidentiality [pic][pic]B) Loss of integrity [pic][pic]C) Loss of functionality [pic][pic]D) Loss of availability [pic] |Points Earned: |1.0/1.0 | |Correct Answer(s): |C | [pic] [pic][pic][pic] 5 . Which of the following is not one of the ! three global methods used in authentication? [pic][pic]A) Something you do [pic][pic]B) Something you have [pic][pic]C) Something you are [pic][pic]D) Something you know [pic] |Points Earned: |1.0/1.0 | |Correct Answer(s): |A | [pic] [pic][pic][pic] 6. Authentication government agency that the person who sends and e-mail will be unable to deny sending the e-mail. [pic][pic]A) True [pic][pic]B) False [pic]...If you want to get a full essay, order it on our website: BestEssayCheap.com
If you want to get a full essay, visit our page: cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.