Scares the user into thinking they have lots of viruses.
Provides a malicious link to ‘fix the problem’
- Scareware
Submitted answers: [ Scareware ]
Which of the following is true regarding access lists applied to an interface?
- One access list may be configured, per direction, for each layer 3 protocol configured on an interface
Submitted answers: [ One access list may be configured, per direction, for each layer 3 protocol
configured on an interface ]
Self replicate without any user help meaning they can spread very quickly.
- Worm
Submitted answers: [ Worm ]
What router command allows you to determine whether an IP access list is enabled on a particular
interface?
- show ip interface
Submitted answers: [ show ip interface ]
“password” is a bad choice for a password.
- True
Submitted answers: [ True ]
Malware is another name for computer viruse
- False
Submitted answers: [ False ]
It is any software designed to damage or to disrupt a system.
- Malicious software (malware)
Submitted answers: [ Malicious software (malware) ]
What will the result of this access list be?
- No IP traffic will be allowed out E0
Submitted answers: [ No IP traffic will be allowed out E0 ]
Which of the following is an example of a standard IP access list?
- access-list 1 deny 172.16.10.1 0.0.0.0
Submitted answers: [ access-list 1 deny 172.16.10.1 0.0.0.0 ]
The following are the goals of network security, EXCEPT;
- Asset Assessment
Submitted answers: [ Asset Assessment ]
In computer security, ……………………. means that computer system assets can be modified only by
authorized parities.
- Integrity
Submitted answers: [ Integrity ]
Which of the following is independent malicious program that need not any host program?
- Worm
Submitted answers: [ Worm ]
A ………….. is a program that can infect other programs by modifying them, the modification includes a
copy of the virus program, which can go on to infect other programs.
- Virus
Submitted answers: [ Virus ]
____________ is used to describe those hackers who use their computer skills with malicious intent for
illegal purposes or nefarious activities
- Black Hats
Submitted answers: [ Black Hats ]
State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy
of itself on another system.
- True, True
Submitted answers: [ True, True ]
The goal of ______________ is to reduce the exposure of the organization to malicious code.
- Anti-virus
Submitted answers: [ Anti-virus ]
" Imagine the status/service of a bank if its customers are unable to make transactions using their
accounts ".This scenario refers to what goals of network security ……..
- Availability
Submitted answers: [ Availability ]
Identify which of the following is NOT a potential risk to the network security.
- Anti-virus Protection
Submitted answers: [ Anti-virus Protection ]
Confidentiality with asymmetric-key cryptosystem has its own
- Problems
Submitted answers: [ Problems ]
Secure Hash Algorithm 1 (SHA-l) has a message digest of
- 160 bits
Submitted answers: [ 160 bits ]
To check the integrity of a message, or document, the receiver creates the
- hash tag
Submitted answers: [ hash tag ]
A digital signature needs a
- public-key system
Submitted answers: [ public-key system ]
Encryption and decryption provide secrecy, or confidentiality, but not
- integrity
Submitted answers: [ integrity ]
A computer virus is a
- Software
Submitted answers: [ Software ]
MAC stands for
- Message Authentication Code
Submitted answers: [ Message Authentication Code ]
The digest created by a hash function is normally called a
- modification detection code (mdc)
Submitted answers: [ modification detection code (mdc) ]
Message confidentiality is using
- asymmetric-key
Submitted answers: [ asymmetric-key ]
To preserve the integrity of a document, both the document and the fingerprint are
- needed
Submitted answers: [ needed ]
A sender must not be able to deny sending a message that was sent, is known as
- message nonrepudiation
Submitted answers: [ message nonrepudiation ]
Network Security provides authentication and access control for resources.
- True
Submitted answers: [ True ]