In some instances, after examining an incoming packet, a firewall can send a message to the packet’s sender that the attempt to transmit the packet has failed.
True
False
True
davidmacago posted 10 months ago
In some instances, after examining an incoming packet, a firewall can send a message to the packet’s sender that the attempt to transmit the packet has failed.
True
False
True
A _____ is a type of an intentional computer and network threat.
a. backdoor
b. latch
c. proxy server
d. corner bolt
a. backdoor
_____ is an example of antispyware software.
a. AndroZip
b. Dogpile
c. STOPzilla
d. Tumblr
c. STOPzilla
The cost of setting up a virtual private network (VPN) is usually high.
True
False
False
Spoofing happens when:
a. a word is converted into a digital pattern.
b. an illegitimate program poses as a legitimate one.
c. keystrokes are monitored and recorded.
d. a firewall rejects the incoming data packets.
b. an illegitimate program poses as a legitimate one.
_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.
a. Proxy servers
b. Virtual private networks
c. Identification badges
d. Intrusion detection systems
d. Intrusion detection systems
_____ is a computer crime that involves destroying or disrupting computer services.
a. Dumpster diving
b. Bombing
c. Sabotage
d. Keystroke logging
c. Sabotage
A hot site, an alternative site to use in case of disaster, does not have the necessary equipment to get up an running immediately.
True
False
False
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
True
False
False
____ uses a public key known to everyone and a private key known only to the recipient.
a. Remote key encryption
b. Symmetric encryption
c. Asymmetric encryption
d. Secret key encryption
c. Asymmetric encryption