MIST 356 Exam 3

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In a(n) ________ attack, the user enters part of a database query instead of giving the expected input.
2.
1 point
________ is a family of operating systems that share interoperability at the kernel level.
3.
1 point
For all applications, a basic rule is ________.
4.
1 point
________ is a version of ________ for PCs.
5.
1 point
In ________ filtering, the firewall examines packets entering the network from the outside.
6.
1 point
Nearly all main border walls today use ________ filtering.
7.
1 point
A(n) ________ is defined as an attack that comes before fixes are released.
8.
1 point
A(n) ________ is a security weakness that makes a program vulnerable to attack.
9.
1 point
Attacks in which a user reaches a directory outside of the WWW root directory and its subdirectories is called a(n) ________ attack.
10.
1 point
________ do not drop packets.
11.
1 point
The most popular way for hackers to take over hosts today is ________.
12.
1 point
MMCs are administrative, used to manage ________ servers.
13.
1 point
Static packet filtering firewalls are limited to ________.
14.
1 point
Overall for firms, which is more time consuming to patch?
15.
1 point
Almost all main border firewalls use ________ filtering as their primary filtering mechanism.
16.
1 point
What is the name for a small program that fixes a particular vulnerability?
17.
1 point
If a firewall cannot keep up with traffic volume, it will ________.
18.
1 point
In a stack overflow attack, to where does the return address point?
19.
1 point
The user reaches a webpage before logging in. This is a(n) ________ attack.
20.
1 point
An attacker types more data in a field than the programmer expected. This is a(n) ________ attack.
21.
1 point
The core part of the LINUX operating system is called ________.
22.
1 point
Which of the following is the most dangerous because it can do more on a computer when it is executed?
23.
1 point
In a(n) ________ attack, information that a user enters is sent back to the user in a webpage.
24.
1 point
A connection between two programs on different computers is represented by its ________.
25.
1 point
________ firewalls filter traffic passing between different parts of a site's network.
26.
1 point
SPI firewalls can conduct ________ inspection.
27.
1 point
The super user account in UNIX is called ________.
28.
1 point
Assigning security measures to groups is better than assigning security measures to individuals within groups because ________.
29.
1 point
________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type.
30.
1 point
A ________ firewall handles all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.