1) Which of the following attacks requires the use of multiple computers? DoS Vi
ID: 3834282 • Letter: 1
Question
1) Which of the following attacks requires the use of multiple computers?
DoS
Virus
DDoS
Worm
2) Which of the following identifies the upper layers of the OSI model in correct order?
Session, application, presentation
Session, presentation, application
Session, application, presentation, physical
Application, presentation, session, physical
3) If Alice and Bob want to send encrypted messages to each other using asymmetric
encryption (PKI) and Bob communicates first. In most cases, what key will Bob use?
Alice’s private key
Alice’s public key
Bob’s private key
Bob’s public key
4) What specific policy might recommend removing a server from the network and re-installing all software and data?
A privacy policy.
An authentication policy.
An incident response policy.
A violations reporting policy
DoS
Virus
DDoS
Worm
Explanation / Answer
1) Which of the following attacks requires the use of multiple computers?
DDoS
2) Which of the following identifies the upper layers of the OSI model in correct order?
Session, presentation, application
3) If Alice and Bob want to send encrypted messages to each other using asymmetric
encryption (PKI) and Bob communicates first. In most cases, what key will Bob use?
Alice’s public key
4) What specific policy might recommend removing a server from the network and
re-installing all software and data?
An authentication policy.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.