Question
Part B - Short Answer - Questions 31 to 36 [30 marks] Choose Six (6) of the following TEN (10) questions to answer. Each question
Part B - Short Answer - Questions 31 to 36 [30 marks]
Choose Six (6) of the following TEN (10) questions to answer. Each question is worth 5 marks. Questions should be answered in 4-8 sentences or using dot points as appropriate.
Question 31
What is Session Hijacking? What actions can the attacker perform once successfully hijacked?
Question 32
Briefly describe ARP poisoning and DNS cache poisoning. Explain with an illustration how an ARP poisoning takes place.
Question 33
Explain reversible and irreversible encipherment mechanisms.
Question 34
Explain what honeypots are. Explain the advantages of two locations that honeypot can be placed in a network.
Question 35
What is a broadcast storm? How can you prevent it from happening?
Question 36
Could you explain the process of brute-force attack?
Question 37
Explain what is a message digest? Quote examples for the use of message digest in real-world scenarios.
Question 38
Explain what public-key infrastructure is.
Question 39
Explain the difference between tunnel and transport mode functionality in IPSEC.
Question 40
What is the difference between random and pseudorandom numbers in algorithms based on cryptography?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started