Product Description
SEC 360 DeVry Week 7 Quiz Latest
SEC 360 DeVry Week 7 Quiz Latest
SEC360
SEC 360 DeVry Week 7 Quiz Latest
Question 1. Question : (TCO 10) Secure hashing is also known as _____.
- public-key cryptography
- a message digest
- Transport Layer Security
- Secure Sockets Layer
- IPSec
Question 2. Question : (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?
- AES
- RSA
- Diffie Hellman
- IN MD5
- PSA
Question 3. Question : (TCO 11) Firewalls do not _____.
- block unauthorized traffic
- detect tampering
- use simple software
- filter words or phrases in traffic
- enforce a security policy
Question 4. Question : (TCO 11) Which of the following is not a characteristic of a proxy server?
- Configured to allow access only to specific systems
- Maintains detailed audit information
- Dependent on all other proxies on the bastion host
- Runs as a nonprivileged user
- Any service that is not supported by the proxy server is blocked.
Question 5. Question : (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.
- software remote procedure calls
- agent technology
- common interfaces
- access to local audit records
Question 6. Question : (TCO 12) A decoy used to lure intruders into staying around is called a(n) _____.
- pharm
- phish
- entrapment
- honeypot
- mug of ale
Question 7. Question : (TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____.
- drive-by attack
- proxy-server attack
- data-driven attack
- penetration testing
- steganography
Question 8. Question : (TCO 13) Which form of malware is dependent on operating systems and replicating?
- Trap door
- Virus
- Worm
- Trojan
- Logic bomb
Question 9. Question : (TCO 13) Which phase of the SDLC should have security representation?
- Concept definition
- Requirements definition
- Design
- Test and Evaluation
- All phases
Question 10. Question : (TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work?
- Trap door
- Virus
- Worm
- Trojan horse
- Logic bomb

SEC 360 DeVry Week 7 Quiz Latest
ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO, ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERALQUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI, LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT
There are no reviews yet.