Quiz W6 IS211
At what layer of the OSI model does cabling play a part?
|
A startup message appears indicating that new software has been installed. What type of virus are you dealing with?
|
||||||||||||||||||||||||
What is the application layer responsible for?
|
You notice a sudden increase in user response time across the network or sudden congestion at choke-points near server farms. What type of virus are you experiencing?
|
||||||||||||||||||||||||
You are setting up a network storage area and want to connect your servers to it. You would like to use IP addresses. What is the best choice?
|
You are looking through your systems and notice that statements are being modified by an attacker run with the same permissions as the component that executed the command. What is happening?
|
||||||||||||||||||||||||
What port does internal message access protocol use?
|
What stores information about a browser session?
|
||||||||||||||||||||||||
You have a user who needs to be secure while at a hotel. The user needs to be able to reach all services while on business trips. What should they use?
|
An attack is happening on a system in your network, and it seems there are three parties in the attacks – the attacks, the intermediary, and the victims. What type of attack is happening?
|
||||||||||||||||||||||||
You are a security professional at an organization and would like to implement a firewall that only check rules when a new communication session starts. What is the best type?
|
You’re experiencing an attack in which the alter intercepts network messages between a web server and a web browser. What is happening?
|
||||||||||||||||||||||||
When a user contacts a protected webpage and the browser then downloads software that connects them to a VPN and requires no advanced configurations. What is the user using?
|
Name one way a malicious code can threaten business.
|
||||||||||||||||||||||||
Which is evidence of virus code activities?
|
You are building out a larger server area, and want to deploy a virtual machine that will cause attackers to think that the server they’re attacking is valid. What are you building?
|
||||||||||||||||||||||||
You find a virus on your system that replicates itself. What would you assume it is?
|
You are scanning and want to find a tool that provides extensive port scanning capabilities. What do you choose?
|
||||||||||||||||||||||||
You notice a large amount of attacks on your system that are calling for money to have their information released. What type of attack is this?
|
You are looking for a solution for your company’s VPN issues, because the VPN is not as secure as it should be. What would be the poorest choice?
|
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper
Get Answer Over WhatsApp Order Paper Now