Related Questions
Q57:
Which of the following sequence of events best describes an online intrusion? A) Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit. B) A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker. C) A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device. D) None of the above.
Q58:
__________ are standalone programs that masquerade as useful utilities or applications.
Q59:
Once you have installed antivirus software, you don't typically need to keep it running full time in the background.
Q60:
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. A) address spoofing exploit B) online intrusion C) brute force attack D) rogue antivirus
Q61:
A(n) __________ pings a packet of data to a port in order to see if that port is open or not. A) rootkit B) port scan C) virus signature D) heuristic analysis
Q63:
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network? A) Network router B) Personal firewall C) Hardware that uses NAT (network address translation) D) All of the above
Q64:
Hackers can use ports to communicate with devices in botnets.
Q65:
A(n) _____________ is a hacker's LAN server that is designed to look like a legitimate Wi-Fi hotspot.
Q66:
A botnet has a server that is controlled by hackers.
Q67:
If you suspect that your computer might be infected by a zero-day exploit, launching a(n) _______________ with a product such as Malwarebytes might identify the infection. A) on-demand scan B) rootkit C) botnet D) DDoS
Home
My Library
- You don't have any courses yet.
- You don't have any books yet.
- You don't have any Studylists yet.
- You haven't viewed any documents yet.
Discovery
- Fanshawe College
- Seneca College
- University of Guelph
- Concordia University
- Laurentian University
- York University
- The University of Western Ontario
- McGill University
- University of Waterloo
- University of Ontario Institute of Technology
- NorQuest College
- University of Toronto
- Wilfrid Laurier University
- University of Ottawa
- McMaster University
- Financial Reporting 1 (ACCT 6010)
- Science Fiction (Ceng 503)
- Fluid Mechanics I (Maae 2300)
- Business Finance II (04-72-271)
- Biology (Grade 11)
- Introduction to Psychology I (PS101)
- Human Resource Management (HRM72105)
- Principles of Microeconomics (ECON 103)
- Human Resource Planning (HRMT70007)
- Chemistry for Engineering Students (Chem 1101)
- Introduction to Biochemistry (BIOC 2580)
- World of Chemistry (CHEM 181)
- Business Law (BLAW 300)
- Systems Studies III (SMS416)
- Human Resource Management (HRM 5003)
- Foundations of Canadian Law (Gs/Law 6502)
- Language and Culture (Anth 354)
- Business Mathematics (BMAT 230)
- Advanced Management Accounting (IAF841)
- Critical Thinking (SSH105)
- Mechanics (203-NYA-05)
- Principles of Sociology (SOC1101)
- Exploration of Professional Nursing Practice (Nurs 250)
- Lab skills PSW (PSHS 105)
- Advance taxation (6720)
- Collaborative Leadership (BUSI2000U)
- Java Programming (Comp228)
- Fitness and Wellness (Hkr 1000)
- Life: Health and Well-Being F (Frhd1100)
- Nursing Practice I (NSE 12A/B)
- Organizational Behaviour (orgs 2100)
- Popular Music after 1945 (Muar 392)
- Introduction to Personality (Psyc 332)
- The Psychology of Pain (Psyc 302)
- Greek Civilization (CLAS 1P91)
- Introductory Pharmacology and Therapeutics (Pharmacology 2060A/B)
- Applied Calculus I (Sc/Math 1013)
- economics (-)
- English 10 (-)
- Perspectives in Aging (HLSC4807U)
- English (ENG4U1)
- Linear Methods I (MATH 211)
- Mathematics (Grade 11)
- Essential Communication Skills (COMM 19999)
- Animal Behaviour (Biol 321)
- NFDN 2004 Assignment 1 - Teaching Plan 2019
- Chapter 1-Thinking Critically with Psychological Science
- Psych 104 Notes - I wrote them based on the slides and the textbook...
- Midterm Exam October 2014, Questions and answers
- Midterm 11 October 2017 - Summary Of Midterm And What Will Be On It
- Psych 104 Notes
- Lecture notes, lectures 10 - Sociolinguistics
- Psych 1xx3 Modules summary
- ECON 101 - Summary Principles Of Microeconomics
- Chapter 1 - Introduction to Psychology
- Chapter 1 - Summary Managing Performance Through Training and Development
- Project Charter (The Savard House)
- Brant Freezer Case
- Lecture notes, lecture 3 - Inflammation and Overview of Immune System
- Lecture notes, lecture Full Course Lecture Notes - 145 pages of detailed notes (Ian Restall)
- Employment and Labour Law - Summary - Chapter 5
- CCNA 1 v7 Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers
- chapter 2 multiple choice Intro to marketing
- Bill Nye cells video worksheet Answers
- MCQ Product design - exam
- CO12101 E IP06 Solution
- FNCE-Time Value of Money The Buy Versus Rent Decision
- Two new software projects are proposed to a young
- Patient Safety - Notes
- Assignemnt 5 MSTM 4050 - assignment
- P3-5B - These mirror exactly exam questions
- SBAR Examples & Case Studies
- De qué forma incidiría nuestra forma de manejar nuestra propia identidad digital en la manera en la que proyectamos nuestra personalidad y mostramos nuestra forma de ser
- Ionic Bonding Gizmo Answers
- Martin - Egg and Sperm notes
- 23. Wrap-up - this is 302 psychology paper notes, researchpsy
- 22. Happiness - Copy - this is 302 psychology paper notes, research n
- 20. Psychology of Social Media
- 21. Psychology of Conspiracy Theories
- 8. Melzack, 1992 (Phantom limb pain review)
- CLAS 1P95 Greek Myth Essay Gaia
- Modelo - USEA PARA Antescedentes
- Paper - Arquitectura Centrada en Web
- Plantilla DE Informe Estad 2022
- Sílabo de Emprendimiento para el Desarrollo Sostenible
- Informe- Psicologia DEL Desarrollo
- Poetry English - This is a poem for one of the year 10 assignments
- Johnstone 11e 05 SM Final
- ANTH 103 F22 Castillo Final
- MANA 445 Fall 2022 Course outline
- Psychology
- Introduction to Corporate Finance WileyPLUS Next Gen Card
- Behavioral Neuroscience
- Cognitive Psychology
- Child Psychology
- Business Law in Canada
- MKTG
- Intermediate Accounting
- Psychology : Themes and Variations
- Business-To-Business Marketing
- Instructor's Resource CD to Accompany BUSN, Canadian Edition [by] Kelly, McGowen, MacKenzie, Snow
- Lehninger Principles of Biochemistry
- Business Essentials
- Organizational Behaviour
- Bioethics: Principles, Issues, and Cases
1. Whichofthefollowingtermswouldbestmatchthisdefinition:Transformsamessageordatafileinsuchawaythat
its contents are hidden from unauthorized readers.
a. authentication
b. encryption
c. ciphertext
d. decryption
ANSWER: b
2. Anoriginalmessageorfilethathasnotyetbeenencryptedisreferredtoasciphertext.
a. True
b. False
ANSWER: False
3. Acryptographic________isaword,number,orphrasethatmustbeknowntoencryptordecryptdata.
ANSWER: key
4. Therearevariousencryptionmethods,but__________istheencryptionstandardcurrentlyusedworldwide.
a. AES
b. DDoS
c. IMSI
d. TLS
ANSWER: a
5. Acryptographic__________isaprocedureforencryptionordecryption.
a. firewall
b. ciphertext
c. key
d. algorithm
ANSWER: d
6. Whichofthefollowingisnotanexampleofanauthenticationprotocol?
a. password
b. PINs
c. fingerprintscanner
d. alloftheabove
ANSWER: d
CengageLearningTesting,Powered byCogneroPage1
Name: Class: Date:
Unit 07 Digital Security