ECE-6200 - Electronics 1: Electronic Devices and Circuits oed answer key
Showing 141 to 160 of 169 total answers.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Fill in the blank. _________ is a group of compromised or hacked computers (bots) controlled by an individual with malicious intent.
Answer
botnet
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?
Answer
Operate the web browser in private browser mode
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
The circuit wherein the during the negative alternation of the ac input voltage, the diode is reverse-biased and there is no current.
Answer
Full-wave rectifier
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
Answer
Snort
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Which protocol is used by the Cisco Cyber threat Defense Solution to collect information about the traffic that is traversing the network?
Answer
NetFlow
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
A special purpose diode uses graded doping where the doping level of the semiconductive materials is reduced as the pn junction is approached.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
A mode wherein either one signal is applied to an input with the other input grounded or two opposite-polarity signals are applied to the inputs.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
A user is surfing the Internet using a laptop from a public WiFi cafe. What should be checked first when the user connects to the public network?
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
The bias wherein the negative side of external voltage is connected to the n region of the diode and its positive side is connected to the p region.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
The bias wherein the positive side is connected to the p region and the negative side of external voltage is connected to the n region of the diode.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
The bias wherein the positive side of external voltage is connected to the n region of the diode and its negative side is connected to the p region.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
The connection wherein the negative terminal of the source is connected to the anode side of the circuit and the positive terminal is connected to the cathode side.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
A type of input signal mode wherein either one signal is applied to an input with the other input grounded or two opposite-polarity signals are applied to the inputs.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits
Refer to the exhibit. Rearrange the letters to fill in the blank The behavior-based analysis involves using baseline information to detect _______that could indicate an attack.
#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits