background presentation
presentation sharing

ICT379

37

0

W
Work from home

Categories

Slides (37)

1 -

Where is an IPS commonly placed in a network?

2 -

The AES uses a ___ bit block size and a key size of ___ bits.

3 -

In the transposition cipher with a keyword, the permutation determined by the keyword "privacy" is ___.

4 -

What problem was Kerberos designed to address?

5 -

The key of the Caesar cipher is ___.

6 -

If it detects a threat, an IPS can ___.

7 -

Which of the following files define all users on a Linux system?

8 -

What type of the access control system uses predefined rules and does not have the concept of a resource owner?

9 -

Authentication is needed to prevent ___.

10 -

The protocol ___ is designed to create security associations, both inbound and outbound.

11 -

The Diffie-Hellman key exchange protocol is vulnerable to ___.

12 -

Which of the following options lists all the seven filed of the </etc/passwd> file in the correct order?

13 -

A firewall determines what traffic is allowed through it based on ___.

14 -

A subsitution box (S-box) of DES takes ___ and outputs ___.

15 -

A collision-resistant hash function can provide ___.

16 -

Which is true of a signature-based IDS?

17 -

Which of the following is a limitation of dictionary attacks?

18 -

What type of network attack relies on multiple hosts participating in an attack on one host

19 -

Which of the cryptographic primitives can be used to encrypt and decrypt data using the same key?

20 -

Which of the cryptographic primitives can be used as proof of a message's sender?

21 -

Which of the following statements regarding discretionary access control is true?

22 -

In which of the following scenarios would you use private-key encryption?

23 -

Which of the following statements about the stages of a cyber attack are true?

24 -

Malware which has the same code but changes its appearance with each infection is called:

25 -

Which of the following forms of malicious software requires a host file to propagate?

26 -

Which of the following forms of malicious software propagates independently through the network?

27 -

Which of the following activities would not be carried out during passive reconnaissance?

28 -

Password salting describes the process in which:

29 -

Which of the following mitigations would be effective in detecting whether a message has been altered since transmission?

30 -

Which of the following is a challenge in the use of public key encryption?

31 -

If you had to summarise the key programming failure with SQL injection, it would be:

32 -

Which security model specifies that subjects should not be able to access information classified at a lower level than themselves?

33 -

What is a good defence against powers that are particular to an eavesdropper?

34 -

Exploitation of the Heartbleed bug permits

35 -

What is one difference between an HTTP GET and an HTTP POST request?

36 -

Which of the following tests is the most intrusive?

37 -

Similar Templates

Frequently Asked Questions

How to use AhaSlides templates?

Visit the Template section on the AhaSlides website, then choose any template that you like to use. Then, click on the Get Template button to use that template right away. You can edit and present immediately without having to sign up. Create a free AhaSlides account if you want to see your work later on.

Do I need to pay to sign up?

Of course not! AhaSlides account is 100% free of charge with unlimited access to most of AhaSlides’s features, with a maximum of 50 participants in the free plan.

If you need to host events with more participants, you can upgrade your account to a suitable plan (please check out our plans here: Pricing - AhaSlides) or contact our CS team for further support.

Do I need to pay to use AhaSlides templates?

Not at all! AhaSlides templates are 100% free of charge, with an unlimited number of templates you can access to. Once you’re in the presenter app, you can visit our Templates section to find presentations catereing to your needs.

Are AhaSlides Templates compatible with Google Slides and Powerpoint?

At the moment, users can import PowerPoint files and Google Slides to AhaSlides. Please refer to these articles for more information:

Can I download AhaSlides templates?

Yes, it’s definitely possible! At the moment, you can download AhaSlides templates by exporting them as a PDF file.