Issc362 Quiz 1 Essay

909 Words Oct 25th, 2014 4 Pages
Question 1 of 20 | 5.0 Points |
Which of the following refers to a piece of code designed to cause harm that is intentionally inserted into a software system and will activate upon the occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points |
Denial of service (DoS) and distributed denial of service (DDoS) attacks have the same effect, however a distributed denial of service (DDos) attack: | | A.involves accessing a system of computers without authorization. | | | B.is launched from large numbers of hosts that have been compromised and act after receiving a
…show more content…
| | | C.the blocking principle. | | | D.port scanning. | | Answer Key: B | | | Question 7 of 20 | 5.0 Points |
A hierarchical system of servers and services specifically designed to translate IP addresses into domain names (forward lookups) as well as the reverse (reverse lookups) is called: | | A.a packet filter. | | | B.a sniffer. | | | C.User Datagram Protocol (UDP). | | | D.Domain Name Service (DNS). | | Answer Key: D | | | Question 8 of 20 | 5.0 Points |
Which of the following regulates the flow of traffic between different networks? | | A.A frame | | | B.Encapsulation | | | C. A firewall | | | D.A sniffer | | Answer Key: C | | | Question 9 of 20 | 5.0 Points |
The most common type of network and the frames that come with it is Institute of Electrical and Electronics Engineers (IEEE), also known as: | | A.token ring. | | | B.wireless | | | C.firewall | | | D.Ethernet | | Answer Key: D | | | Question 10 of 20 | 5.0 Points |
Which of the following is protocol used to enable communication securely between points on a Virtual Private Network (VPN)? | | A.Layer 2 Tunneling Protocol | | | B.Serial Line Interface Protocol | | | C.User Datagram Protocol | | | D.Reverse Address Resolution Protocol | | Answer Key: A | | | Question 11 of 20 | 5.0 Points |
Cryptography provides an

More about Issc362 Quiz 1 Essay