Give us your feedback!
Question:
What is the name of the authentication system developed at MIT to identify networked users' identity?
Response:
Aurora
CHAP
Kerberos
Pegasus
Match the type of security attack with the best definition
brute force
a security attack which uses every possible combination of characters from a predetermined list
dictionary
a security attack which uses every possible word from a predetermined list
cross-site scripting (XSS)
a security attack which injects scripts into web applications
SQL injection
a security attack which injects malicious commands into user input data supplied to web applications
XML injection
a security attack which injects malicious data into user input data supplied to web applications
buffer overflow
a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location
ping flood
a security attack which injects ICMP packets into a network which are targeted to a specific host
smurf attack
a security attack which injects ICMP requests into a network which are targeted from a specific host
Computer footprinting is:
the times and locations of typical usage for a given system, user or service
the description of the physical space required for a given system
the description the of the physical space, electrical load, thermal boundaries and noise levels required for a given system
the set of data common to a user across multiple platforms and/or websites (the collection of data from social media, browsing/purchasing history, ads, etc.)
Which of the rules may be applied to a domain using an AD Group Policy:
Passwords may not use certain common phrases or words
Minimum password length
Passwords must be unique across multiple accounts
Password history
Passwords cannot be shared between users of a single system
Passwords must not be written down