Logo
Flashcard >MIS Quiz 6
Add Flashcard
1/10

In some instances, after examining an incoming packet, a firewall can send a message to the packet’s sender that the attempt to transmit the packet has failed.
True

False

True

profile imgdavidmacago posted 10 months ago

In some instances, after examining an incoming packet, a firewall can send a message to the packet’s sender that the attempt to transmit the packet has failed.
True

False

True

A _____ is a type of an intentional computer and network threat.

a. backdoor
b. latch
c. proxy server
d. corner bolt

a. backdoor

_____ is an example of antispyware software.

a. AndroZip
b. Dogpile
c. STOPzilla
d. Tumblr

c. STOPzilla

The cost of setting up a virtual private network (VPN) is usually high.
True

False

False

Spoofing happens when:

a. a word is converted into a digital pattern.
b. an illegitimate program poses as a legitimate one.
c. keystrokes are monitored and recorded.
d. a firewall rejects the incoming data packets.

b. an illegitimate program poses as a legitimate one.

_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.

a. Proxy servers
b. Virtual private networks
c. Identification badges
d. Intrusion detection systems

d. Intrusion detection systems

_____ is a computer crime that involves destroying or disrupting computer services.

a. Dumpster diving
b. Bombing
c. Sabotage
d. Keystroke logging

c. Sabotage

A hot site, an alternative site to use in case of disaster, does not have the necessary equipment to get up an running immediately.

True

False

False

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

True

False

False

____ uses a public key known to everyone and a private key known only to the recipient.

a. Remote key encryption
b. Symmetric encryption
c. Asymmetric encryption
d. Secret key encryption

c. Asymmetric encryption

Recommended Books

Reading books is a great way to learn. Here are some of the books we recommend.