MIST 356 Exam 2

Is this your test? Login to manage it. If not, you can build an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A ________ attack is when a webserver is flooded with application layer web requests.
2.
1 point
The original 802.11 core security protocol, ________, was deeply flawed.
3.
1 point
In Kerberos, the ________ is the supplicant's proof that it has already authenticated itself with the Kerberos Server.
4.
1 point
________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for automatic rekeying.
5.
1 point
2) In regards to network security, ________ means preventing unauthorized users from gaining information about the network structure, data flowing across the network, network protocols used, or packet header values.
6.
1 point
________ is/are effective method(s) to preventing ARP poisoning attacks.
7.
1 point
In the military, departments do not have the ability to alter access control rules set by higher authorities in ________.
8.
1 point
Which of the following is one of the four bases for authentication credentials?
9.
1 point
________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis.
10.
1 point
Most central authentication servers are governed by the ________ standard.
11.
1 point
CAs distribute public keys ________.
12.
1 point
Which of the following is an example of a wireless attack?
13.
1 point
________ is one method of thwarting DoS attacks by dropping all IP packets from an attacker.
14.
1 point
Giving a user permissions to use a certain resource is ________.
15.
1 point
An attacker controlling bots in a coordinated attack against a victim is known as a ________.
16.
1 point
Which of the following statements accurately describes fingerprint recognition?
17.
1 point
A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
18.
1 point
Hand geometry recognition is used heavily for ________.
19.
1 point
Microsoft's directory server product is ________.

20.
1 point
Iris recognition technology is ________ and ________.
21.
1 point
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
22.
1 point
If Directory Server A trusts Directory Server B, Directory Server B trusts Directory Server C, and Directory Server A trusts Directory Server C, this is ________ trust.
23.
1 point
________ is the centralized policy-based management of all information required for access to corporate systems by people, machines, programs, or other resources.
24.
1 point
________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.
25.
1 point
Ensuring network ________ means that authorized users have access to information, services, and network resources.
26.
1 point
________ are an additional layer of compromised hosts that are used to manage large groups of bots.
27.
1 point
________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.
28.
1 point
For computer access, a false ________ means that a legitimate user is denied access to a resource.
29.
1 point
________ is used by ________ for authentication.
30.
1 point
________ are compromised hosts running malware controlled by the hacker.