Question
Question 34 Yarrow and similar special purpose generators are cryptographically secure random number generators. True False 10 points Question 35 For a spoofed DNS response
Question 34
Yarrow and similar special purpose generators are cryptographically secure random number generators.
True
False
10 points
Question 35
"For a spoofed DNS response to be accepted and cached, the spoofed response must match the original DNS query in which of the following fields? You may select more than one answer."
UDP source port | ||
TCP sequence number | ||
Query ID (QID) | ||
Question |
10 points
Question 36
What type of malware uses different encryption code with each infection?
Virus | ||
Polymorphic | ||
Metamorphic | ||
Armored |
10 points
Question 37
A random nonce in an HTML hidden field with each form can mitigate CSRF attacks.
True
False
10 points
Question 38
"Identify which secure design principle is being followed or violated in the following situation. Two server processes, a web and a database server, run on the same physical server."
Least Privilege | ||
Fail-Safe Defaults | ||
Economy of Mechanism | ||
Complete Meditation | ||
Open Design | ||
Separation of Privilege | ||
Least Common Mechanism | ||
Psychological Acceptability |
10 points
Question 39
Which security control would best mitigate the dangers of a laptop stolen from a company?
Anti-Virus | ||
BIOS password | ||
Disk encryption | ||
OS password |
10 points
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started