1. Which of the following statements are true of Asymmetric and Symmetric encryption?
2. IDS is an intrusion detection system whereas an IPS is an intrusion _________ system.
3. What is the following referring to? "A user enters a script in the client side input fields and the input gets processed without validation."
4. Encryption is reversible whereas hashing is irreversible. Hashing can be cracked using rainbow tables and collision attacks but is not reversible.
6. __________ is process of sending messages in order to gather information about network, system etc. by analysing the response received
7. What is the following referring to? "Abiding by a set of standards set by a government/Independent party/organisation."
8. In case you cannot ping the final destination, ________ will help to identify where the connection stops or gets broken, whether it is firewall, ISP, router etc.
9. DDoS stands for disintegrating denial of stops (attack).
10. ____________ is filtering of unnecessary services running on various ports and removal of default test scripts from the servers.
11. _____ is a standard security technology for creating an encrypted link between a server and a client (usually a web server and a web browser).
12. If you had to both compress and encrypt data during a transmission, which would you do first?
13. RDP stands for Remote desktop protocol, and its port number is 3389.
14. Name the two protocols for sending packets of information over the internet. They are built on top of the internet protocol.
15. TLS is transport layer security and is a ______________ to SSL.