Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) Which of the following attacks requires the use of multiple computers? DoS Vi

ID: 3834282 • Letter: 1

Question

1) Which of the following attacks requires the use of multiple computers?

DoS

Virus

DDoS

Worm

2) Which of the following identifies the upper layers of the OSI model in correct order?

Session, application, presentation

Session, presentation, application

Session, application, presentation, physical

Application, presentation, session, physical

3) If Alice and Bob want to send encrypted messages to each other using asymmetric

encryption (PKI) and Bob communicates first. In most cases, what key will Bob use?

Alice’s private key

Alice’s public key

Bob’s private key

Bob’s public key

4) What specific policy might recommend removing a server from the network and re-installing all software and data?

A privacy policy.

An authentication policy.

An incident response policy.

A violations reporting policy

DoS

Virus

DDoS

Worm

Explanation / Answer

1) Which of the following attacks requires the use of multiple computers?
DDoS

2) Which of the following identifies the upper layers of the OSI model in correct order?
Session, presentation, application

3) If Alice and Bob want to send encrypted messages to each other using asymmetric
encryption (PKI) and Bob communicates first. In most cases, what key will Bob use?
Alice’s public key

4) What specific policy might recommend removing a server from the network and
re-installing all software and data?
An authentication policy.