1. Which of the following is NOT a data communications control objective?
a. maintaining the critical application list
b. correcting message loss due to equipment failure
c. preventing illegal access
d. rendering useless any data that a perpetrator successfully captures
2. Reviewing database authority tables is a(n)
a. access control.
b. organizational structure control.
c. data resource control.
d. operating resource control.
3. Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host’s network using a technique called
a. spoofing.
b. spooling.
c. dual homed.
d. screening.
4. Transmitting numerous SYN packets to a targeted receiver, but NOT responding to an ACK, is
a. a DES message.
b. the request response technique.
c. a denial of service attack.
d. a call back device.