1.
The worst attacks are the ones that:
2.
What type of network requires availability to the Internet and public networks as a major requirement and has several access points to other networks, both public and private?
3.
The security team at Certkiller Inc. is working on network security design. What is an example of a trust model?
4.
Which type of attack can be mitigated only through encryption?
5.
The security team at Certkiller Inc. is working on understanding attacks that happen in the network. What type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed through a firewall, and can never be completely eliminated?
6.
John the security administrator at Certkiller Inc. is working on securing the network with strong passwords. What is the definition of a strong password?
7.
This program does something undocumented which the programmer intended, but that the user would not approve of if he or she knew about it.
8.
Choose the true statements regarding IP spoofing attack and DoS attack. (Choose all that apply)
9.
What method helps mitigate the threat of IP spoofing?
10.
What is an example of a trust model?