Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Good morning, I want a solution now, please. I don't have much time . Introduction to Security Two users want to communicate via email using

Good morning, I want a solution now, please. I don't have much time. Introduction to Security

Two users want to communicate via email using unsecured channel. The system must ensure the principle of non-repudiation between the two users by signing their certificates. Which of the following should be used to sign their certificates?

CA

RA

CRL

CSR

A company requires users to scan their fingerprint to access an application. The developers of the application want to implement multifactor authentication. Which of the following should be implemented?

Facial recognition using a camera

Implement iris recognition

Hand geometry scan

Have users sign their name naturally

A developer added a special function in a .php file that will remove semicolons, dashes, quotes and comma from an input filed that accept a string data type. Which of the following attacks this function will help to stop?

Padding to protect against string buffer overflows.

Error handling to protect against website exploitation.

Input validation to protect against SQL injection.

Exception handling to protect against XSRF attack.

An employer requires that employees use a key-generating app on their mobile phones to log into the company application. With reference to authentication factor, this authentication factor is defined as:

Something you know

Something you have

Something you are

Something you do

A user account lockout after five unsuccessful login attempts. The user account is repeatedly locked out over a period of a workweek. Which of the following types of attack MOST likely happening?

Brute Force

Dictionary Attack

Social Engineering

MITM Attack

Which of the following can be provided to AAA server in an identification process?

Username

Private certificate

Permissions

Access control

With reference to physical security, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility. Which of the following best describe the deployed security control?

Administrative

Corrective

Deterrence

Compensating

Telnet over port 23

IMAP over port 143

FTP over port 21

HTTPS over port 443

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DATABASE Administrator Make A Difference

Authors: Mohciine Elmourabit

1st Edition

B0CGM7XG75, 978-1722657802

More Books

Students also viewed these Databases questions