Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?
Answer : A
You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network. Which form of encryption should you use?
Answer : D
At what layer of the OSI/RM does a packet filter operate?
Answer : B
What is the primary drawback of using symmetric-key encryption?
Answer : A
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?
Answer : A
You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?
Answer : D
A disgruntled employee has discovered that the company Web server is not protected against particular buffer overflow vulnerability. The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server's hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges. What is the name for this particular type of attack?
Answer : D