• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Which malware variant is described below?:




This malware variant is self-replicating: the infection can be spread by receiving or executing objects, for example e-mail attachments that are executed by the user

Virus

Which attack is described below?


(victim attacker webserver)

Man in the middle attack

In the field of network security, we can recognize a number of desirable properties of secure communication.




Which property of secure communication is described below?:




The contents of the communication is not altered in transit, either maliciously or by accident

Message integrity

In the field of network security, we can recognize a number of aspects.




Which property of secure communication is described below?:




Services must be accessible and available to users.

access and availability.

What mechanism is used within an authentication protocol to defend against replay attacks?

Handshake

There is an e-mail encryption scheme that has become de facto standard. What is the name of this software?

PGP

What are the sequential phases that are carried out when setting up a SSL connection? Identify the phases and enter your answer like 1234:

Handshake, Key derivation, Data transfer, Connection closure

Virtual private networks (VPN) use a special protocol for their security, that operates at the network layer. What is the name of this protocol?

Tunneling protocols

Firewalls can be classified in three categories. Name the category that is described below:




The firewall looks beyond the information in TCP/UDP/IP headers. It makes policy decisions based on application data to decide whether a packet can pass or is blocked

Stateless packet filters

To detect advanced attacks, the system performs deep packet inspection and analysis. When it observes a suspicious packet or series of packets, it could alert the network administrators, so that the suspicious activity can be analyzed further and appropriate action can be taken

IDS Intrusion detection system

In the field of network security, we can recognize a number of desirable properties of secure communication. Which property of secure communication is described below?




The sender and receiver should be able to confirm the identity of the other party involved in the communication.

Authentication

Which protocol on the transport layer is enhanced by security services by using SSL?

TLS

Only the sender and receiver should understand the contents of the transmitted message.

Confidentiality