Question
please I need these answers : Question 1 Classify firewalls as a security control as one of the following types: prevention, detection, recovery. Choose the
please I need these answers :
Question 1
"Classify firewalls as a security control as one of the following types: prevention, detection, recovery. Choose the answer that best fits."
Detection | ||
Prevention | ||
Recovery |
10 points
Question 2
Which of the following techniques will best protect against cross-site scripting?
Output encoding | ||
Blacklist input validation | ||
Whitelist input validation | ||
Prepared statements |
10 points
Question 3
Which technology would protect the confidentiality of your communication when using an unencrypted wireless network?
Anti-virus | ||
Firewall | ||
Proxy server | ||
VPN |
10 points
Question 4
"Which of confidentiality, integrity, or availability does TLS protect during transmission. You may choose more than one answer."
Integrity | ||
Availability | ||
Confidentiality |
10 points
Question 5
Any connection to a honeypot is probably an attack.
True
False
10 points
Question 6
Which of the following attacks is mitigated by salting passwords?
Offline password guessing | ||
Online password guessing | ||
Side channel attacks | ||
Rainbow tables |
10 points
Question 7
Which of the following techniques will best protect against SQL injection?
Stored procedures | ||
Blacklist input validation | ||
Whitelist input validation | ||
Prepared statements |
10 points
Question 8
Cookies can be read by an attacker and used to authenticate as the victim from the following sources.
Your browser's web cache. | ||
HTTP connections | ||
HTTPS connections | ||
Your browser's cookie jar file. |
10 points
Question 9
"Alice, Bob, Claire, and Dan communicate via symmetric cryptography. Each pair does not want the other persons to be able to see their private communications, i.e. Alice and Bob want to communicate without Claire or Dan being able to read their messages. How many different secret keys does this group need?"
1 | ||
4 | ||
6 | ||
8 |
10 points
Question 10
"Classify passwords as a security control as one of the following types: prevention, detection, recovery. Choose the answer that best fits."
Detection | ||
Prevention | ||
Recovery |
10 points
Question 11
"Which of the following attacks would NOT be stopped by a stateless firewall positioned at an organization's gateway with the Internet, but which could be detected by a network intrusion detection system? You may select more than one answer."
An insider attacks an internal database. | ||
An external hacker uses an nmap ACK scan to map the organization's network. | ||
An employee navigates to a web page which contains malicious JavaScript. | ||
An employee brings a mobile device infected with malware to work. |
10 points
Question 12
"Which of confidentiality, integrity, or availability does hashing stored passwords protect. You may choose more than one answer."
Confidentiality | ||
Availability | ||
Integrity |
10 points
Question 13
"Mallory sends thousands of SYN packets to Bob's server, spoofing the packets to appear to be from google.com. Classify this as a violation of confidentiality, integrity, or availability."
Confidentiality | ||
Integrity | ||
Availability |
10 points
Question 14
"Identify each of the following statements that is true based on the command: iptables -A INPUT -i eth1 -p tcp --dport 22 --tcp-flags SYN,ACK -j ACCEPT"
This rule accepts only connections on any network interface. | ||
This rule accepts only connections coming from port 22. | ||
This rule accepts connections from any IP address. | ||
This rule accepts only connections going to port 22. |
10 points
Question 15
How do SYN scans differ from FIN scans in nmap? You may choose more than one answer.
SYN scans don't work on Linux systems. | ||
FIN scans can pass through firewalls. | ||
FIN scans don't work on Windows systems. | ||
Both scans find the same ports. |
10 points
Question 16
AES is only secure when used in Electronic Code Book (ECB) mode.
True
False
10 points
Question 17
Identify which secure design principle is being followed or violated in the following situation. Changing a firewall architecture from a single gateway firewall to a DMZ architecture with two firewalls.
Least Privilege | ||
Fail-Safe Defaults | ||
Economy of Mechanism | ||
Complete Meditation | ||
Open Design | ||
Separation of Privilege | ||
Least Common Mechanism | ||
Psychological Acceptability |
10 points
Question 18
Captive portal security on a wireless network can be bypassed by which of the following techniques.
ARP spoofing | ||
DNS spoofing | ||
IP spoofing | ||
MAC spoofing |
10 points
Question 19
Which of the following techniques can be used to evade detection by a signature-based intrusion detection system? You may choose more than one answer.
Fragmentation of packets | ||
Changing the case of filenames. | ||
URL encoding | ||
Overly long paths with extra ./ sequences |
10 points
Question 20
"Eve performs an FMS WEP cracking attack. Classify this as a violation of confidentiality, integrity, or availability."
Confidentiality | ||
Integrity | ||
Availability |
10 points
Question 21
Symmetric ciphers with 128 bit keys are secure against brute force attacks.
True
False
10 points
Question 22
TLS certificates contain the subject's private key.
True
False
10 points
Question 23
Which of the following hash functions is currently considered to be secure against collision attacks in new applications? You may choose more than one answer.
MD5 | ||
SHA-2 | ||
SHA-1 | ||
SHA-3 |
10 points
Question 24
The snort intrusion detection system is based on anomaly detection.
True
False
10 points
Question 25
"Alice and Bob both belong to group student. If Alice has a data file in her home directory, which is mode 755, what mode must she set the file to in order for Bob to able to read it, while following the Principle of Least Privilege and not giving too much access to Bob or anyone else?"
600 | ||
640 | ||
660 | ||
777 |
10 points
Question 26
Covert channels in TCP packets can use which of the following to send data. You may select more than one answer.
Packet size | ||
Time between packets being sent. | ||
URG pointer | ||
ACK flag |
10 points
Question 27
RC4 is which type of cipher?
Block cipher | ||
Stream cipher | ||
Substitution cipher | ||
Public key cipher |
10 points
Question 28
Which of the following is a software engineering process for improving security? You may select more than one answer.
Abuse cases | ||
Code reviews | ||
Protection rings | ||
Factory process |
10 points
Question 29
Which of the following hash functions does NOT need to use the HMAC algorithm to avoid length extension attacks?
MD5 | ||
SHA-1 | ||
SHA-2 | ||
SHA-3 |
10 points
Question 30
"Mallory uses a hash collision to generate two X.509 certificates with identical hashes. A CA signs one digitial certificate, and Mallory copies the signature to the other certificate. Classify this as a violation of confidentiality, integrity, or availability."
Confidentiality | ||
Integrity | ||
Availability |
10 points
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started