Question

1. (TCO A) A common motivation for a hacker is _____. (Points : 5)        economic motivation...

1. (TCO A) A common motivation for a hacker is _____. (Points : 5)
       economic motivation
       to win a prize in a competition
       to pass a job interview test
       to answer a test question
Question 2.2. (TCO A) DNS information gained through WHOIS is used for what kind of reconnaissance? (Points : 5)
       Active reconnaissance
       Passive reconnaissance
       Passive scanning
       Active grouping
Question 3.3. (TCO B) Updates to programs and the operating system _____. (Points : 5)
       should never be tested before installation due to licensing
       should only be installed after they are tested
       must all be installed as soon as possible
       are never issued for Linux-based systems
Question 4.4. (TCO B) In relation to network security standards and guidelines, Cisco best practices include _____. (Points : 5)
       Storing the operation system in NVRAM
       installing hotfixes before service packs
       using the same basic mode and privileged level passwords
       using different basic mode and privileged level passwords
Question 5.5. (TCO C) _____ is a nonproprietary protocol that provides excellent reporting capabilities for the accounting function. (Points : 5)
       RADIUS
       TACACS+
       AES
       DES
Question 6.6. (TCO C) The public key infrastructure provides authentication through _____. (Points : 5)
       private exchanges
       advanced digital certificates
       UDP/TCP
       public general law certificates
Question 7.7. (TCO D) A routing protocol with built-in authentication is _____. (Points : 5)
       RIP
       OSPF
       EIGRP
       IS-IS
Question 8.8. (TCO E) The Diffie-Hellman algorithm is _____. (Points : 5)
       a public key algorithm
       a standards creation body for VPNs
       obsolete at this time
       only used for e-commerce sites
Question 9.9. (TCO F) The version of WPA2 that uses a preshared key is named _____. (Points : 5)
       WEP
       WPA2-PSK
       WPA-PSK
       Enterprise Server
Question 10.10. (TCO G) A vulnerability analysis tool that can intrude into a connection is _____. (Points : 5)
       DSniff
       Hunt
       On Station
       Ethernet
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.  economic motivation - Hackers generally hack the system to gain confidential information which they can sell or can get some money from. Rest of the things comes under ethical hacking.

2. Active reconnaissance: - Data obtained from DNS is done by Passive reconnaissance and then is used to launch Active reconnaissance.

3. must all be installed as soon as possible: - Because most updates include solving vulnerabilities of system, which needs to be installed as soon as possible.

4. using different basic mode and privileged level passwords: - Cisco applies various authentication levels and guidlines for network security managerment.

5. TACACS+ - RADIUS is used basically for applying additional layer of security.

6.  advanced digital certificates : - Digital signature is kind of a public key certificate which is used basically to authenticate the sender of a message using public key infrastructure or PKI

7. OSPF: - OSPF is a protocol having authentication key mechanism that can be used to build authentic rounting tables..

8. a public key algorithm - Diffie-Hellman or DH algorithm is primarily based on public key mechanism passed over public channel . It creates a key which is used to implement symmetric key ciphers.

9. WPA-PSK: - PSK here means pre shared key.

10. Hunt - Hunt is the tool that can intrude in a TCP/IP network and find out vulnerabilities in it. Dsniff is used to snif or find the vulnerabitities by network auditing.

Add a comment
Know the answer?
Add Answer to:
1. (TCO A) A common motivation for a hacker is _____. (Points : 5)        economic motivation...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • 1. (TCO 7) Which of the following statements are true? (Points : 5)        Interfaces contain...

    1. (TCO 7) Which of the following statements are true? (Points : 5)        Interfaces contain one and only one implemented method, a constructor.        Interfaces are defined inside an abstract class.        All methods defined in an interface must be implemented when used by another class.        A true object-oriented design must contain as least one interface. Question 2. 2. (TCO 7) In an object-oriented program, methods with no implementation might be found in an _____ and/or a(n) ______....

  • QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who...

    QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points    QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...

  • 1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel...

    1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....

  • What are your top 3 takaways from this article? It’s always tempting to see the present...

    What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...

  • summatize the following info and break them into differeng key points. write them in yojr own...

    summatize the following info and break them into differeng key points. write them in yojr own words   apartus 6.1 Introduction—The design of a successful hot box appa- ratus is influenced by many factors. Before beginning the design of an apparatus meeting this standard, the designer shall review the discussion on the limitations and accuracy, Section 13, discussions of the energy flows in a hot box, Annex A2, the metering box wall loss flow, Annex A3, and flanking loss, Annex...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT