_________________ is the warranty that a message wasn't captured and tampered with
throughout verbal exchange transit. - ANS-Integrity
_________________ refers back to the potential to affirm a machine's or someone's
identification. - ANS-Authentication
__________________ and Authentication Header (AH) are used to comfy IPSec
transmissions. - ANS-Encapsulating Security Payload (ESP)
"Contact Us" bureaucracy are an instance of which of the following? - ANS-Limited two-way
communique
A _________________ sits between the Internet and the client systems responding to client
requests for Web pages. - ANS-proxy server
A commonplace path traversal assault uses which syntax sequences to attempt to locate
restricted regions on a server? - ANS-../
A DoS attack is designed to weigh down a specific aid making it unavailable. - ANS-True
A(n) ________________ is a passive community monitoring and protection system. -
ANS-intrusion detection machine (IDS)
AH is the protocol within IPSec used for encryption offerings. - ANS-False
An assault has took place on your network. An attacker changed into capable of traverse
several files and folders, looking for touchy information. What kind of attack has befell? -
ANS-Unsecure direct object reference
Anita has currently logged on a shopping website to purchase a new bicycle and motorcycle
shorts. She is involved that the communique link isn't relaxed. Which of the following could
she check to verify a secure hyperlink? - ANS-Verify that HTTPS is being used inside the
URL
Applications hardening is the procedure of securing applications in use on a network. -
ANS-True
As network administrator, you are worried with the plaintext transmission of touchy data on
the network. Which of the following protocols are used to help cozy communications? (Select
three.) - ANS-* IPSec
* SSL
* IKE
Banking on line on a public wi-fi network is at ease if a modern-day browser is used and if a
robust username and password combination is used. - ANS-False
Content spoofing tactics often include which of the following? - ANS-A and C handiest
(Spam e mail links and Chatroom hyperlinks)
CSRF attacks take advantage of the believe a Web website has in a user's Web browser. -
ANS-True
Denial-of-carrier (DoS) assaults stop get entry to to legal users of a Web website. -
ANS-True
Despite the overpowering fashion of groups having an internet presence, some companies
do no longer see an ok go back on investment from a Web site; or their Web website
generates little or no hobby. Which of these following characteristics might NOT be a aspect
for negative performance by a Web website? - ANS- / 365 availability