Introduction to Cybersecurity

Congratulations! You passed!

Grade received91.66%

Latest Submission Grade91.67%

To pass75% or higherGo to next item

Retake the assignment in 8h

1.

Question 1

What is the primary function of a firewall?

1 / 1 point

Correct

2.

Question 2

How many unique encryption keys are required for 2 people to exchange a series of messages using symmetric key cryptography?

0 / 1 point

Incorrect

3.

Question 3

What are the three (3) types of modern encryption?

1 / 1 point

Correct

4.

Question 4

What is Locard’s exchange principle?

1 / 1 point

Correct

5.

Question 5

Which two (2) are types of firewall?

1 / 1 point

Correct

6.

Question 6

Which type of data does a packet-filtering firewall inspect when it decides whether to forward or drop a packet?

1 / 1 point

Correct

7.

Question 7

Which three (3) of the following are limitations of Application gateways?

1 / 1 point

Correct

8.

Question 8

Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?

1 / 1 point

Correct

9.

Question 9

Which statement about Stateful firewalls is True?

1 / 1 point

Correct

10.

Question 10

True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.

1 / 1 point

Correct

11.

Question 11

Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?

1 / 1 point

Correct

12.

Question 12

What are two (2) drawbacks to using symmetric key encryption?

1 / 1 point

Correct

Click here to order similar paper @Udessaywriters.com.100% Original.Written from scratch by professional writers.

You May Also Like

About the Author: admin