Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof (Note: Each item is worth 1

Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof (Note: Each item is worth 1 mark.). A. A virus infects Faisals computer and erases all his documents.

Faisal Receive an email claiming to be from bank Alahli asking him to change his password.

A hacker breaks into Faisal's website and crashes it.

A Student installs the key-loggers program in lab G134 to steal a password.

Fahad installs a camera pointing to Dr. Faisals keypad computer.

A hacker feeds plain-text files into a hash, eventually finding two or more that create the same fixed-value hash result. This anomaly is known as what?

Which of the following security controls provide(s) integrity? (Select all that apply)

Hashing

Fault tolerance

Digital signatures

Non-repudiat

Which of the following are passive footprinting methods? (Choose all that apply.)

Checking DNS replies for network mapping purposes

Collecting information through publicly accessible sources

Performing a ping sweep against the network range D. Sniffing network traffic through a network tap

Which of the following statements is true regarding encryption algorithms?

Symmetric algorithms are slower, are good for bulk encryption, and have no scalability problems.

Symmetric algorithms are faster, are good for bulk encryption, and have no scalability problems.

Symmetric algorithms are faster, are good for bulk encryption, but have scalability problems.

Symmetric algorithms are faster but have scalability problems and are not suited for bulk encryption.

Elements of security include confidentiality, integrity, and availability. Which technique provides for integrity and confidentiality? A. Encryption B.

UPS C.

Hashing

Passwords

As a white hacker, you begin searching using nmap tool for discovering ranges of IP owned by Jazan university. You also read job postings and news articles and visit the Jazans website. Throughout the first week of the searching, you also observe when employees come to and leave work, and you rummage through the trash outside the building for helpful information. After that, you used the information you obtained to access sensitive data.

What type of attacks are you doing when collecting and accessing sensitive data?

Differentiate between inside and outside attacks in the previous scenario?

Preventive which one of these attacks is more complicated. Justify your answer

Dr. Faisal wants to send a confedential document to all students. What is the best method that can be used to protect data from the hacker and how can the stundest verifiy the anuthenticty of the sender.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions