Question

answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT...

answer the following questions:

1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE):
a)true
b)false
2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE):
a)true
b)false.
3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE):
a)true
b)false
4)the wireless access point provides a connection to the network or service(SELECT ONE):
a)true
b)false
5)blocking ICMP packets may help prevent denial-of-service attacks.(SELECT ONE)
a)true
b)false
6)In a virus attack ,the victim machine is the source(SELECT ONE):
a)true
b)false
7)Which of the following devices sits between a client and a web server and communicates with the server on behalf of the client?(SELECT ONE):
a)proxy server
b)IDS

c)firewall

d)DMZ

8)what is a DNS record that maps a domain name to a IP address(SELECT ONE):
a)pointer
b)host
c)Cname
d)Name server
9)how to remove a trojan from a system?(SELECT ONE):
a)purchase commercially available tools to remove the trojan.
b)reboot the system.
c)uninstall and reinstall all application.
d)search the internet for freeware removal tools
0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine...

    A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device. Instructions: Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan. For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • 1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of...

    1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security. Select one: True False 2)Which term below is frequently used to describe the tasks of securing information that is in a digital format? Select one: a. network security b. information security c. logical security d. physical security 3) The ____ Act requires banks and financial institutions to alert customers of...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • #1. Which of the following is NOT one of the driving forces behind the dramatic increase...

    #1. Which of the following is NOT one of the driving forces behind the dramatic increase in the use of smartphones? a) growing use of social media b) lower prices of smartphones c) more apps and games d) longer battery life #2. Hardware consists of computer equipment that is used to perform all of the following activities EXCEPT: a) storage b) input c) analysis d) processing #3. Diego and Mary Ann are seeking _________, available for free, so they can...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 14. Select the number of participants in the Beck & Watson study Group of answer choices...

    14. Select the number of participants in the Beck & Watson study Group of answer choices 8 13 22 35 15. Beck & Watson determined their final sample size via Group of answer choices coding saturation triangulation ethnography 16.Through their study, Beck & Watson determined Group of answer choices after a traumatic birth, subsequent births have no troubling effects after a traumatic birth, subsequent births brought fear, terror, anxiety, and dread Subsequent Childbirth After a Previous Traumatic Birth Beck, Cheryl...

  • 10. The Beck & Watson article is a Group of answer choices quantitative study qualitative study...

    10. The Beck & Watson article is a Group of answer choices quantitative study qualitative study 11. Beck & Watson examined participants' experiences and perceptions using what type of research design? Group of answer choices particpant obersvation phenomenology 12. Select the participants in the Beck & Watson study Group of answer choices Caucasian women with 2-4 children Caucasian pregnant women 13. In the Beck & Watson study, data was collected via a(n) Group of answer choices internet study focus group...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT