Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

information security principles answer the queations Developing a fake or less useful website and is meant to just fetch the IP address is very easily

information security principles
answer the queations image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers. * (0.5 Points) O A True O B. False 5 Unknown exploits have a confirmation of and measures can be taken against it to resolve them. (0.5 Points) O A True O B. False 6 The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is (0.5 Points) O A. Distributed Denial-of-Service (DDoS) O B. Denial-of-Service (DoS) O C. DDoS and Dos O D. Permanent Denial-of-Service (PDOS) E. Controlled Denial-of-Service (CDoS) 9 Which of the following is a non-technical type of intrusion or attack technique? (0.5 Points) A. Reverse Engineering B. Malware Analysis C. Social Engineering O D. Dumpster Diving E C and D 10 We use Cryptography term to transforming messages to make them secure and immune to: (0.5 Points) A. Attacks B. Tempering OC. Altering O D. All of the above O E A and B 13 Firewalls are often categorized as: * (0.5 Points) A. Packet Filters B. Network Firewalls O C. Host Based Firewalls O D. All of the above E B and c 14 ensures that sensitive information is kept away from those not authorized. (0.5 Points) O A Availability B. Confidentiality OC.Cryptography D. Integrity E All of the above 15 Which of the following is not true: * (0.5 Points) O A. The Publicly accessible centralized directory of digital certificates is known as Certificate Repository. O B. Protocol analyzer - Captures packets to decode and analyze their contents: facilitated by a router. O C. Message Digest is one-way hash algorithms that provides data confidentiality. O D. B and C E None of the above 17 Which action cannot be performed through a successful SQL injection attack? * (0.5 Points) O A. reformat the web application server's hard drive B. display a list of customer telephone numbers O C. discover the names of different fields in a table O D. erase a database table O E. None of the above 18 Which of the following information is not contained in digital certificate: * (0.5 Points) A. Owner's name or alias OB. Owner's public key C. Issuer's name O D. Issuer's Private key E. None of the above 19 What type of free downloaded software may include spyware? * (0.5 Points) O A. Electronic Games O B. Screensavers and toolbars O C. Anti-spyware software O D. All of the above O E. A and B 20 Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment? (0.5 Points) O A OS hardening 8. Application control C. Virtualization D. Sandboxing E B and D 21 What best describes phishing? (0.5 Points) A. It is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. B. It is a form of password attack by manipulating individuals into exposing confidential or personal information that may be used for fraudulent purposes. O C. It is the criminally fraudulent process of a keylogger attempting to capture keyboard keystrokes of the user, D. All of the above describes phishing very well. B and C 22 Which of them is not a major way of stealing email information? (0.5 Points) O A Stealing cookies O B. Reverse Engineering OC. Password Phishing O D. Social Engineering O E A and B 23 The antivirus or PC defender software in a system helps in detecting Virus and Trojans but not Ransomware (0.5 Points) A True B. Fake 26 Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment?* (0.5 Points) O A OS hardening OB. Application control O C. Virtualization O D. Sandboxing E. All of the above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Students also viewed these Databases questions

Question

b. Explain how you initially felt about the communication.

Answered: 1 week ago