If an intruder commits security voilations during an active session, who is held accountable ?
The intruder
The network administrator
The user who initiated the session
The resource manager
What happens when a buffer recievs more data than it can hold ?
The excess data is bounced back to the senders Network, causing it to crash
The excess data is abosrbed into the reciepient network, causing it to slowdown
The excess data overflows into the adjacent buffers, corrupting or overwriting the valid data held in them
The excess data is removed by the compiler usually
In the following form of DOS attack, a resource is bombarded with more data or TCP/IP packets that it can process
Flooding
Saturating
Inundation
Data-surge
Which type of attacks involves hackers creating programs that issue forged IP addresses ?
Back-door
Birthday
Man-in-the-middle
Spoofing
Imagine you are a programmer who deliberately left an opening in a piece of code during the build phase that allows you an unknown entry into the application. Using this opening in the code, which of the following types of attack could hackers use to gain unauthorized access to the application ?
Which of the following option would be the best choice to guard against social engineering in a large organization ?
Inbox rules
End user education
Firewall
The corporate intranet
Which of the following improves performance by distributing data across the disks in a RAID set ?
Parity
Striping
Mirroring
Clustering
Which network topology is particularly suscpetible to security voilations ?
Linear
Star
Ring
Cellular
Which type of password is valid for a single login session and is then permanently discarded ?
Dynamic
One time
Static
Hybrid
Which of the following is affcted by the size of the biometric data file
Data collection techniques
Enrollment time
Throughput rates
User and system contact