A web session can be protected against the eavesdroping

Assignment Help Computer Network Security
Reference no: EM13924209

 

Part 1: True (T) or False (F).

EXAMPLE QUESTIONS ONLY

T  F     Your Professor's last name is Douglas.   Answer: ___F___ (it is Kelly)

T  F     This course is INFO610.   Answer: ___T___

1. T  F   Deep packet inspection firewalls protect networks by blocking packets based on the packets' header information at the network (IP) layer.  

 Answer: _____   If F, why? Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment.

This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications.  Answer: _____

2. T  F     Intrusion Detection Systems (IDS) provide no protection from internal threats.

 Answer: _____

3. T  F     A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses.   

Answer: _____

4. T  F    Security awareness, training, and education programs are key components of organizational risk management strategies.

 Answer: _____                 

Part 2:

1. Match the following TCP/IP protocol layer with its function (select a.b.c., or d. below):

A. Network            1. Coordinates communication between applications.

B. Physical            2. Supports useful functions over the transport layer such identity/location of applications.

C. Application        3. Moves information between hosts that are not directly connected.

D. Transport          4. Moves bits between the nodes in the network.

1. A--->3; B--->4; C--->2; D--->1

2. A--->2; B--->4; C--->1; D--->4

3. A--->2; B--->3; C--->4; D--->1

4. A--->3; B--->4; C--->1; D--->2

Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:

1. A patent

2. A copyright

3. A trademark

4. Ethical standards

Answer: _____

3. Security threats include which of the following:

1. Unlocked doors

2. Disgruntled employees

3. Hurricanes

4. Un-patched software programs

5. All of the above

Answer: _____

4. Denial of service attacks include (select one or more):

1. Buffer overflow attack

2. Smurf attack

3. Ping flood attack

4. SYN flood attack

5. All of the above

Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server.

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016.

This is an example of which of the following attacks?

1. Virus

2. Logic Bomb

3. Spoofing

4. Trojan horse

5. Botnet

6. Rootkit

7. Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm.

Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process.

Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret.

They would like to protect this formula for as long as possible.

What type of intellectual property protection best suits their needs?

1. Copyright

2. Trademark

3. Patent

4. Trade Secre

Answer:  _______

7. You should clear cookies in your browser periodically because:

1. They (Cookies) can be used to track your web browsing behavior and invade your privacy.

2. They can facilitate impersonation attacks.

3. They can be used to spread viruses.

4. a. & b.

5. b. & c.

6. a., b. & c.

Answer:  _________

8. A TCP/IP session hijacking can be best described as:

a.

Providing false identity information to gain unauthorized access

b.

Establishing a connection without specifying a username or password

c.

An attacker takes control of a session between the server and a client

d.

Flooding the connection with too many requests

Answer:  _________

9. Tracker attacks in databases get around:

1. Anonymization

2. Data transformation

3. Query size restriction

4. Data partitioning

Answer:  _________

10. A race condition attack can result in:

1. A symbolic link

2. Object orientation

3. A deadlock

4. Access to low address memory locations

Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.

1. Data perturbation

2. Database access control

3. Inference channeling

4. Output perturbation

Answer: _________

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.

1. compromise

2. inference

3. partitioning

4. query restriction

Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?

1. A firewall system at the connection point to the Internet

2. An improved RBAC-based access control system for the application servers

3. File-level encryption

4. Kerberos authentication

Answer: _______

14. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?

a.

A privacy policy

b.

An authentication policy

c.

An incident response policy

d.

Wireless network access policy

Answer: ________

15. The security risk of allowing dynamic content ( to execute) on a target machine is:

1. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.

2. Malware may be included in the downloaded code and infect the target machine.

3. The mobile code author may never be known.

4. None of the above.

Answer: _______                     

16. Encrypting a message with a private key (of the sender) in an asymmetric system provides:

1. Proof of receipt

2. Confidentiality

3. Proof of origin

4. Message availability

Answer:_______

17. The correct ordering of the upper layers of the OSI model are

1. Session, application, presentation

2. Session, presentation, application

3. Session, application, presentation, physical

4. Application, presentation, session, network

Answer: _______

18. In relational database parlance, the basic building block is a __________, which is a flat table.

1. attribute                                                    

2. tuple                           

3. primary key                                              

4. relation

5. field

Answer: _______

19. Gateways operate at the _____________ of the OSI stack?

1. Transport

2. Application

3. Session

4. Network

5. Data Link

Answer: _____

20. Which e-mail security protocol(s) depend(s) upon a "Web of Trust"?

1. Kerberos

2. Public Key Infrastructure (PKI)

3. Secure Sockets Layer (SSL)

4. Transport Layer Security (TLS)

5. Pretty Good Privacy (PGP)

6. Secure Multipurpose Internet Mail Extensions (S/MIME)

7. Privacy Enhanced Mail (PEM)

8. Data Link

Answer: _____

Reference no: EM13924209

Questions Cloud

Calculate the three components of the dupont formula : Identify and calculate the three components of the DuPont formula. calculate the ROE for 2011, using the three components of the DuPont formula. calculate the sustainable-growth rate for 2011.
Diseconomies of scope between two products : When there are diseconomies of scope between two products that are separately produced by two firms, merging into a single firm can:
How would you explain the risk to the public : Imagine that you are the spokesperson for a facility that just spilled a chemical into the local waterway, that supplies the town's drinking water. How would you explain the risk to the public
Determine which valuation ratios is most appropriate : Determine which one of the three valuation ratios is most appropriate for comparing companies in this industry. Support your answer with two reasons that make that ratio superior to either of the other two ratios.
A web session can be protected against the eavesdroping : Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016.
Information technology strategic plan : Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty. The company hired you because of your expertise with mobile apps, socia..
Failure of the firm accounting information system : Based on the information you researched, assess the failure of the firm's accounting information system to prevent the related fraud / embezzlement.
Significant economic effects of the researched issues : Provide a detailed description of the issues that you have researched. Analyze the most significant economic effects of the researched issues on healthcare industry. Provide at least two (2) examples of these issues to support your response.
Examine the trends in roe using dupont analysis : How do their common-size financial statements differ? Examine their trends in ROE using DuPont analysis. Comment on the differences and/or similarities you find.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Potential physical vulnerabilities and threats

Identify and analyze any potential physical vulnerabilities and threats that require consideration.

  Write down a 1000- to 1500-word paper explaining the

write a 1000- to 1500-word paper describing the importance of policies and standards for maintaining information

  Design a network or network component

Students are to design a network or network component using a design tool (example: Visio or CAD). Required is a visual representation of this network along with a document describing all aspect of the network design including product selection.

  What is penetration testing?

What is penetration testing?

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Investigating data theft

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft.

  What is the role of data mining

What is the role of data mining

  Paper on physical secuirty

You will write a paper on what area you chose and why. You will explain what in this area you want to expand also why this important to the company.

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Case study - asymmetric and symmetric encryption

Case Study - Asymmetric and Symmetric Encryption, ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  What is the order of the public key

What is the order of the public key and Which masking keys kM are possible - Decrypt the message without computing Bob's private key

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd