Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
Which malware variant is described below?: This malware variant is self-replicating: the infection can be spread by receiving or executing objects, for example e-mail attachments that are executed by the user |
Virus |
|
Which attack is described below? (victim attacker webserver) |
Man in the middle attack |
|
In the field of network security, we can recognize a number of desirable properties of secure communication. Which property of secure communication is described below?: The contents of the communication is not altered in transit, either maliciously or by accident |
Message integrity |
|
In the field of network security, we can recognize a number of aspects. Which property of secure communication is described below?: Services must be accessible and available to users. |
access and availability. |
|
What mechanism is used within an authentication protocol to defend against replay attacks? |
Handshake |
|
There is an e-mail encryption scheme that has become de facto standard. What is the name of this software? |
PGP |
|
What are the sequential phases that are carried out when setting up a SSL connection? Identify the phases and enter your answer like 1234: |
Handshake, Key derivation, Data transfer, Connection closure
|
|
Virtual private networks (VPN) use a special protocol for their security, that operates at the network layer. What is the name of this protocol? |
Tunneling protocols |
|
Firewalls can be classified in three categories. Name the category that is described below: The firewall looks beyond the information in TCP/UDP/IP headers. It makes policy decisions based on application data to decide whether a packet can pass or is blocked |
Stateless packet filters |
|
To detect advanced attacks, the system performs deep packet inspection and analysis. When it observes a suspicious packet or series of packets, it could alert the network administrators, so that the suspicious activity can be analyzed further and appropriate action can be taken |
IDS Intrusion detection system |
|
In the field of network security, we can recognize a number of desirable properties of secure communication. Which property of secure communication is described below? The sender and receiver should be able to confirm the identity of the other party involved in the communication. |
Authentication |
|
Which protocol on the transport layer is enhanced by security services by using SSL? |
TLS |
|
Only the sender and receiver should understand the contents of the transmitted message. |
Confidentiality |