SEC 450 SEC450 Week 1 Quiz Answers (2018)
SEC 450 SEC450 Week 1 Quiz Answers (2018)
BUY HERE⬊
1. (TCO 1) In a masquerade attack, which does an attacker steal when pretending to come from a trusted host?
2. (TCO 1) The agents used in a distributed denial of service attack are called _____.
3. (TCO 1) When an attacker monitors traffic between a sender and receiver, this is called a(n) _____ attack.
4. (TCO 1) The _____ attack method modifies the IP header to indicate that there are more data than there actual are.
5. (TCO 1) The _____ attack method uses the target IP address as both a source and destination to confuse the destination host or router.
6. (TCO 1) The component of network security that ensures that authorized users have access to data and network resources is _____.
7. (TCO 1) The type of security control that makes use of firewalls is called _____.
8. (TCO 1) The likelihood that a particular attack will result in undesirable consequences is called a(n) _____.
2. (TCO 1) The agents used in a distributed denial of service attack are called _____.
3. (TCO 1) When an attacker monitors traffic between a sender and receiver, this is called a(n) _____ attack.
4. (TCO 1) The _____ attack method modifies the IP header to indicate that there are more data than there actual are.
5. (TCO 1) The _____ attack method uses the target IP address as both a source and destination to confuse the destination host or router.
6. (TCO 1) The component of network security that ensures that authorized users have access to data and network resources is _____.
7. (TCO 1) The type of security control that makes use of firewalls is called _____.
8. (TCO 1) The likelihood that a particular attack will result in undesirable consequences is called a(n) _____.
Comments
Post a Comment