Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please I need these answers : Question 1 Classify firewalls as a security control as one of the following types: prevention, detection, recovery. Choose the

please I need these answers :

Question 1

"Classify firewalls as a security control as one of the following types: prevention, detection, recovery. Choose the answer that best fits."

Detection

Prevention

Recovery

10 points

Question 2

Which of the following techniques will best protect against cross-site scripting?

Output encoding

Blacklist input validation

Whitelist input validation

Prepared statements

10 points

Question 3

Which technology would protect the confidentiality of your communication when using an unencrypted wireless network?

Anti-virus

Firewall

Proxy server

VPN

10 points

Question 4

"Which of confidentiality, integrity, or availability does TLS protect during transmission. You may choose more than one answer."

Integrity

Availability

Confidentiality

10 points

Question 5

Any connection to a honeypot is probably an attack.

True

False

10 points

Question 6

Which of the following attacks is mitigated by salting passwords?

Offline password guessing

Online password guessing

Side channel attacks

Rainbow tables

10 points

Question 7

Which of the following techniques will best protect against SQL injection?

Stored procedures

Blacklist input validation

Whitelist input validation

Prepared statements

10 points

Question 8

Cookies can be read by an attacker and used to authenticate as the victim from the following sources.

Your browser's web cache.

HTTP connections

HTTPS connections

Your browser's cookie jar file.

10 points

Question 9

"Alice, Bob, Claire, and Dan communicate via symmetric cryptography. Each pair does not want the other persons to be able to see their private communications, i.e. Alice and Bob want to communicate without Claire or Dan being able to read their messages. How many different secret keys does this group need?"

1

4

6

8

10 points

Question 10

"Classify passwords as a security control as one of the following types: prevention, detection, recovery. Choose the answer that best fits."

Detection

Prevention

Recovery

10 points

Question 11

"Which of the following attacks would NOT be stopped by a stateless firewall positioned at an organization's gateway with the Internet, but which could be detected by a network intrusion detection system? You may select more than one answer."

An insider attacks an internal database.

An external hacker uses an nmap ACK scan to map the organization's network.

An employee navigates to a web page which contains malicious JavaScript.

An employee brings a mobile device infected with malware to work.

10 points

Question 12

"Which of confidentiality, integrity, or availability does hashing stored passwords protect. You may choose more than one answer."

Confidentiality

Availability

Integrity

10 points

Question 13

"Mallory sends thousands of SYN packets to Bob's server, spoofing the packets to appear to be from google.com. Classify this as a violation of confidentiality, integrity, or availability."

Confidentiality

Integrity

Availability

10 points

Question 14

"Identify each of the following statements that is true based on the command: iptables -A INPUT -i eth1 -p tcp --dport 22 --tcp-flags SYN,ACK -j ACCEPT"

This rule accepts only connections on any network interface.

This rule accepts only connections coming from port 22.

This rule accepts connections from any IP address.

This rule accepts only connections going to port 22.

10 points

Question 15

How do SYN scans differ from FIN scans in nmap? You may choose more than one answer.

SYN scans don't work on Linux systems.

FIN scans can pass through firewalls.

FIN scans don't work on Windows systems.

Both scans find the same ports.

10 points

Question 16

AES is only secure when used in Electronic Code Book (ECB) mode.

True

False

10 points

Question 17

Identify which secure design principle is being followed or violated in the following situation. Changing a firewall architecture from a single gateway firewall to a DMZ architecture with two firewalls.

Least Privilege

Fail-Safe Defaults

Economy of Mechanism

Complete Meditation

Open Design

Separation of Privilege

Least Common Mechanism

Psychological Acceptability

10 points

Question 18

Captive portal security on a wireless network can be bypassed by which of the following techniques.

ARP spoofing

DNS spoofing

IP spoofing

MAC spoofing

10 points

Question 19

Which of the following techniques can be used to evade detection by a signature-based intrusion detection system? You may choose more than one answer.

Fragmentation of packets

Changing the case of filenames.

URL encoding

Overly long paths with extra ./ sequences

10 points

Question 20

"Eve performs an FMS WEP cracking attack. Classify this as a violation of confidentiality, integrity, or availability."

Confidentiality

Integrity

Availability

10 points

Question 21

Symmetric ciphers with 128 bit keys are secure against brute force attacks.

True

False

10 points

Question 22

TLS certificates contain the subject's private key.

True

False

10 points

Question 23

Which of the following hash functions is currently considered to be secure against collision attacks in new applications? You may choose more than one answer.

MD5

SHA-2

SHA-1

SHA-3

10 points

Question 24

The snort intrusion detection system is based on anomaly detection.

True

False

10 points

Question 25

"Alice and Bob both belong to group student. If Alice has a data file in her home directory, which is mode 755, what mode must she set the file to in order for Bob to able to read it, while following the Principle of Least Privilege and not giving too much access to Bob or anyone else?"

600

640

660

777

10 points

Question 26

Covert channels in TCP packets can use which of the following to send data. You may select more than one answer.

Packet size

Time between packets being sent.

URG pointer

ACK flag

10 points

Question 27

RC4 is which type of cipher?

Block cipher

Stream cipher

Substitution cipher

Public key cipher

10 points

Question 28

Which of the following is a software engineering process for improving security? You may select more than one answer.

Abuse cases

Code reviews

Protection rings

Factory process

10 points

Question 29

Which of the following hash functions does NOT need to use the HMAC algorithm to avoid length extension attacks?

MD5

SHA-1

SHA-2

SHA-3

10 points

Question 30

"Mallory uses a hash collision to generate two X.509 certificates with identical hashes. A CA signs one digitial certificate, and Mallory copies the signature to the other certificate. Classify this as a violation of confidentiality, integrity, or availability."

Confidentiality

Integrity

Availability

10 points

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Science Project Ideas In Health Care Volume 1

Authors: Zemelak Goraga

1st Edition

B0CPX2RWPF, 979-8223791072

More Books

Students also viewed these Databases questions

Question

LOQ 16-8: Does psychotherapy work? How can we know?

Answered: 1 week ago