Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?

Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?A . IPSB . HIDSC . DMZD . NIDSView AnswerAnswer: B Explanation: A host-based intrusion detection system (HIDS) produces a false alarm because...

September 17, 2020 No Comments READ MORE +

John works as a C programmer. He develops the following C program:

John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.A . SQL injectionB . Denial-of-ServiceC . Buffer overflowD . Cross site scriptingView AnswerAnswer: C Explanation: This program takes a user-supplied string and copies it into 'buffer1', which can hold up...

September 17, 2020 No Comments READ MORE +

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?

Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?A . Application layerB . Internet layerC . Link layerD . Transport LayerE . NoneView AnswerAnswer: C Explanation: The Link Layer of TCP/IP model is...

September 17, 2020 No Comments READ MORE +

Which of the following TCP commands are used to allocate a receiving buffer associated with the specified connection?

Which of the following TCP commands are used to allocate a receiving buffer associated with the specified connection?A . SendB . CloseC . NoneD . ReceiveE . InterruptView AnswerAnswer: D Explanation: The Receive command is used to allocate a receiving buffer associated with the specified connection. An error is returned...

September 17, 2020 No Comments READ MORE +

Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.

Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.A . Circuit-level gatewayB . StatefulC . Proxy serverD . Dynamic packet-filteringView AnswerAnswer: DB Explanation:...

September 17, 2020 No Comments READ MORE +

Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?

Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?A . Website defacementB . Zero-day attackC . SpoofingD . Buffer overflowView AnswerAnswer: A Explanation: Website defacement is an attack on a website...

September 17, 2020 No Comments READ MORE +

Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.

Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.A . Message replayB . Identity theftC . Message modificationD . Message digestE . Message repudiationF . EavesdroppingG . False messageView AnswerAnswer: FBCGAE Explanation: Following are...

September 17, 2020 No Comments READ MORE +

Which of the following policies helps in defining what users can and should do to use network and organization's computer equipment?

Which of the following policies helps in defining what users can and should do to use network and organization's computer equipment?A . General policyB . Remote access policyC . IT policyD . User policyView AnswerAnswer: D Explanation: A user policy helps in defining what users can and should do to...

September 16, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. The ___________ protocol is a feature of packet-based data transmission protocols. It is used to keep a record of the frame sequences sent and their respective acknowledgements received by both the users

FILL BLANK Fill in the blank with the appropriate term. The ___________ protocol is a feature of packet-based data transmission protocols. It is used to keep a record of the frame sequences sent and their respective acknowledgements received by both the users.View AnswerAnswer: Sliding Window Explanation: The Sliding Window protocol...

September 16, 2020 No Comments READ MORE +

Fill in the blank with the appropriate word. The primary goal of _________________ risk analysis is to determine the proportion of effect and theoretical response

FILL BLANK Fill in the blank with the appropriate word. The primary goal of _________________ risk analysis is to determine the proportion of effect and theoretical response.View AnswerAnswer: qualitative Explanation: Qualitative risk analysis uses the likelihood and impact of the identified risks in a fast and cost-effective manner. Qualitative risk...

September 16, 2020 No Comments READ MORE +