• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

Modern Network Security Threats

Collapse
This is a sticky topic.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Modern Network Security Threats

    Here you will find answers to Modern Network Security Questions

    Question 1
    Which item is the great majority of software vulnerabilities that have been discovered?
    A. Stack vulnerabilities
    B. Software overflows
    C. Heap overflows
    D. Buffer overflows


    Answer: D
    Question 2
    Which statement is true about vishing?
    A. Influencing users to forward a call to a toll number (for example, a long distance or international number)
    B. Influencing users to provide personal information over the phone
    C. Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance or international number)
    D. Influencing users to provide personal information over a web page


    Answer: B
    Explanation
    Vishing (voice phishing) uses telephony to glean information, such as account details, directly from users. Because many users tend to trust the security of a telephone versus the security of the web, some users are more likely to provide confidential information over the telephone. User education is the most effective method to combat vishing attacks.
    Question 3
    In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?
    A. Roughly 66 percent
    B. Roughly 10 percent
    C. Roughly 75 percent
    D. Roughly 50 percent


    Answer: D
    Question 4
    Observe the following options carefully, which two attacks focus on RSA? (Choose all that apply.)
    A. DDoS attack
    B. BPA attack
    C. Adaptive chosen ciphertext attack
    D. Man-in-the-middle attack


    Answer: B C
    Phạm Minh Tuấn

    Email : phamminhtuan@vnpro.org
    Yahoo : phamminhtuan_vnpro
    -----------------------------------------------------------------------------------------------
Trung Tâm Tin Học VnPro
149/1D Ung Văn Khiêm P25 Q.Bình thạnh TPHCM
Tel : (08) 35124257 (5 lines)
Fax: (08) 35124314

Home page: http://www.vnpro.vn
Support Forum: http://www.vnpro.org
- Chuyên đào tạo quản trị mạng và hạ tầng Internet
- Phát hành sách chuyên môn
- Tư vấn và tuyển dụng nhân sự IT
- Tư vấn thiết kế và hỗ trợ kỹ thuật hệ thống mạng

Network channel: http://www.dancisco.com
Blog: http://www.vnpro.org/blog
Working...
X