Which of the following best describes https

Assignment Help Computer Networking
Reference no: EM13330482

1. Briefly define/describe what is meant by "defensive programming."?

2. Which of the following is NOT a valid category of software errors?
a) Porous Defenses
b) Malware activation
c) Insecure interaction between components
d) Risky resource management

3. Identify a form of injection attack, AND briefly describe what is involved in this type of attack.

4. Which of the following is NOT a valid characteristic of cross site scripting?
a) An attack where input from one user is later output to another user
b) Commonly seen in scripted web apps
c) Can be created with JavaScript and Active X
d) Social networking websites are immune to cross site scripting

5. Identify AND briefly describe an approach for validating the input to a program.

6. Match the following with the words that best describe them (4 points)
Memory leak; Race condition; Fuzzing; Least Privilege;
Privilege escalation; Canonicalization; Safe code; XSS reflection;
a) A powerful testing method using a large range of randomly generated inputs ____________________
b) Where multiple processes or threads compete to gain access to resources possibly resulting in corrupted data and/or lost changes ____________________
c) Attackers exploit flaws in programs to give the attacker great authority or power ____________________
d) Where a program fails to correctly manage use and release of memory causing a steady reduction in available memory to the point where it is completely exhausted ____________________

7. Briefly define/describe the "white listing" security approach.

8. Which of the following is the best definition/description of the chroot jail Linux/Unix security control?
a) Prevents a user from switching to su/root level privilege
b) Shuts down discretionary access control mechanisms
c) Restricts a system/user view of the file system to a specified portion
d) Encrypts the password file
9. Briefly define/describe the function/purpose of a virtual machine hypervisor OR describe one of the hypervisor's security roles.

10. Which of the following is the best definition for a data archive?
a) Saving copies of all security logs and records
b) Retaining copies of data over an extended period of time
c) Automatic saving of data
d) Making copies of data at regular intervals

11. Briefly define what we mean by "system hardening" AND identify one specific step/approach you might take for hardening an operating system.

12. Identify and briefly describe one (1) of the primary rules of the BLP model.

13. Match the following with the words that best describe them:
Biba model; Clark Wilson model; Chinese Wall Model; Reference Monitors;
a) Developed for commercial applications to deal with conflicts of interest ____________________
b) Elaborate yet practical integrity model that includes rules requiring well-formed transactions and separation of duties ____________________
c) Controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects ____________________

14. Which of the following is NOT one of the basic services offered by a TPM?
a) Certified patching
b) Authenticated boot
c) Encryption
d) Certification

15. Briefly describe the fundamental problem/flaw of BLP that prevents it being widely implemented or practically useful.

16. Briefly define/describe "assurance" AND identify how it is related to the "common criteria."

17. Which of the following security concepts is particularly suitable for use in a Multilevel Security (MLS) environment?
a) Poly-instantiation
b) Role-based access control (RBAC)
c) Chinese Firewall
d) Three person control

18. Briefly define a "security audit."

19. Which of the following is NOT a part of the security audit model/architecture?
a) Audit trail database
b) Alarm processor
c) Audit analyzer
d) Event discriminator

20. Which of the following is the best definition for an audit trail?
a) The database of security related events collected by an audit system
b) A chronological record of the steps that auditors go through during an evaluation of your security controls
c) The path that your log data takes as it moves through the network to the archives
d) A timeline of system activities that is sufficient to reconstruct an event like a break-in

21. Identify/list three (3) auditable events that your audit system should collect.

22. Which of the following is NOT one of the six major audit functions?
a) Audit analysis
b) Data generation
c) Event translation
d) Automatic response

23. Briefly describe the role and importance of "baselining" or "establishing a baseline" as part of a security audit program.

24. Which IP Security (IPSec) mode protects the entire IP packet?
a) Transport mode
b) AH mode
c) Tunnel mode
d) Privacy mode

25. Which of the following is NOT one of the SSL protocols?
a) Handshake
b) Change cipher spec
c) Agreement
d) Record

26. Which of the following is NOT one of security functions of S/MIME?
a) Receipt service
b) Envelope
c) Signature
d) Confidentiality/encryption

27. Name three (3) types of agents involved in DomainKeys Identified Mail (DKIM).

28. Which of the following best describes HTTPS?
a) Combination of HTTP and IPSec
b) Combination of HTTP and SSL
c) Combination of HTTP and S/MIME
d) Combination of HTTP and DKIM

29. Name the three primary components and avenues for attack of wireless system.

30. Which of the following is NOT a threat associated with wireless networks?
a) Man-in-the-middle attack
b) Malicious association
c) Denial of Service
d) Transport reflection

31. Name one acceptable form of 802.11 wireless LAN security/encryption AND name one unacceptable form.

32. Briefly describe/explain what an IEEE 802.11 BSS consists of AND how it is different than an ESS.

33. Which of the following is NOT one of the IEEE 802.11i phases of operation?
a) Key management
b) Discovery
c) Negotiation
d) Protected data transfer

Reference no: EM13330482

Questions Cloud

Explain carbon from the most recent remains of an extinct : Carbon from the most recent remains of an extinct Australian marsupial, called Diprotodon, has a specific activity of 0.61 pCi/g. Modern carbon has a specific capacity of 6.89 pCi/g. How long ago did the Diprotodon apparently become extinct? Answe..
What are some certificates that a wooden pallet company : What are some certificates that a wooden pallet company should look into?
Find the final speeds of the two particles after collision : Two particles with masses 2m and 5m are moving toward each other along the x axis with the same initial speed, Find the final speeds of the two particles after the collision
Find the value of each individual mass : A heavier mass m1 and a lighter mass m2 are 20.0 cm apart and experience a gravitational force of attraction that is 9.00 10-9 N in magnitude. Determine the value of each individual mass
Which of the following best describes https : Name one acceptable form of 802.11 wireless LAN security/encryption AND name one unacceptable form.
Define covalent gecl4 germanium tetrachloride which is ionic : Cl2 is one of the seven diatomic elements H2SO4 is sulfuric acid and has the sulfate ion with neg 2 charge CH4 is a methane molecule is organic and covalent GeCl4 Germanium tetrachloride which is ionic
How much torque is applied to the disk : Starting from rest, a 12 cm diameter compact disk takes 2.4 s to reach its operating angular velocity of 1925 rpm. How much torque is applied to the disk
Globalization-corporate responsibility and ethics : You are a manager in a large, global manufacturing and servicesorganization. You're trying to explain to your grandfather howdifferent your job is from his before he retired ten years ago. Youboth know how society has changed and you want to explain ..
Compute ct the total dissolved inorganic carbon : Any help on how to do or start this problem? Suppose the gas above the soda in a bottle of a soft drink is pure CO2 at a pressure of 2 atm. a. Estimate the pH of the soda. b. Calculate CT, the total dissolved inorganic carbon.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain systems security certifications consortium web site

What are the areas addressed in CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

  Reason to pay attention to faulty terminations

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans? Why is it critical to label patch cables, ports, and data jacks?

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

  Upgrading bus topology to a star topology lan

You are requested to upgrade bus topology LAN at a friend's house to a star topology LAN. your friend wishes to connect three computers.

  Outline the design of a wireless network

Outline the design of a wireless network to support user mobility over a wide area. Include in your answer a discussion of addressing, routing and the used of fixed versus ad hoc network access nodes or base stations.

  Sketching lan with operation over a distance

You have been asked to sketch a LAN with operation over a distance of about 100m.

  Determine number wait states for proper system operation

How many wait states (clock cycles) need to be inserted for proper system operation if bus clocking rate is 8 MHz?

  How is this applied to changing the coding?

when writing a linear cipher using n = 27, if a = ?, b = ? and c = 7, if ac = 1(mod27) how is this applied to changing the coding?

  Install the web server role via server manager

Role services installed by default and project enables you to install the Web Server role via Server Manager.

  Advantages and disadvantages of simultaneous tcp connections

Can you configure the browser to open multiple simultaneous connections to the Web site? Write down the advantages and disadvantages of having large number of simultaneous TCP connections?

  Create ip addressing scheme for five departments

You are hired to create the IP addressing scheme for five departments which will give security and access to Internet. Each department needs between 1,500 - 2,000 IP addresses.

  How does the csma-ca in dcf handle media contention

Explain how does the CSMA/CA in DCF handle media contention and define ‘throughput' in regards to wireless network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd