SEC 280 - Quiz - Week - 6A+
- From Business, Accounting
- NUMBER1TUTOR
- Rating : 88
- Grade : A+
- Questions : 0
- Solutions : 0
- Blog : 3
- Earned : $14856.59
Question 1.
Question :
(TCO 3) A _____ is a software or hardware device used to observe traffic as it passes through a network on shared broadcast media.
Student Answer:
logic bomb
network sniffer
backdoor
trapdoor
Instructor Explanation:
Page 396
Points Received:
3 of 3
Comments:
Question 2.
Question :
(TCO 3) In a _____ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all the systems on that network.
Student Answer:
smurf
denial-of-service
viral
worm
Instructor Explanation:
Page 397
Points Received:
3 of 3
Comments:
Question 3.
Question :
(TCO 3) The art of "secret writing" is called _____.
Student Answer:
spoofing
smurfing
cryptography
cryptanalysis
Instructor Explanation:
Page 402
Points Received:
3 of 3
Comments:
Question 4.
Question :
(TCO 5) Securing e-mail is something that must be done by _____.
Student Answer:
networking administrators
security administrators
outlook express
users
Instructor Explanation:
Page 422
Points Received:
3 of 3
Comments:
Question 5.
Question :
(TCO 5) A worm is a type of virus that _____.
Student Answer:
is scripted to send itself to other systems
is designed to crawl in under a firewall
buries itself between the kernel and the Application Layer of the operating system
is passed through e-mails with a subject heading that has the word "worm" in it
Instructor Explanation: