Question
What type of web server is sending packet/frame 280 of the capture? 2. What type of HTTP Status Code is the web server in
What type of web server is sending packet/frame 280 of the capture?
2. What type of HTTP Status Code is the web server in packet/frame 314 sending? Google the error and provide a quote summarizing the nature of the error as well as an MLA formatted reference for that quote.
For question 3, open the file telnet.dmp
3. What is the user name and password provided to the telnet server in the file telnet.dmp? Was the authentication successful? Note: Right click the link to the file and select "Save As" to save the file.
4. Define the following terms:
a. cryptography
b. cryptanalysis
c. non-repudiation
d. diffusion (in the context of cryptography)
e. confusion (in the context of cryptography)
5. According to the course presentations, what is the name (A) of the only unbreakable cryptosystem created to date, who (B) invented it, where did they work (C), and what year did they invent it (D)?
A. ______________________________________________________
B. ______________________________________________________
C. ______________________________________________________
D. ______________________________________________________
6. What is the destination address in the following TCP/IP header?
0x45 0x00 0x00 0x30 0x43 0x91 0x00 0x00 0x71 0x06
0xcd 0x30 0xd5 0x96 0x5b 0xa6 0xc0 0xa8 0x01 0x01
0x91 0x34 0x17 0x0c 0x37 0xca 0xbd 0x60 0x79 0xfe \0xf3 0xfc 0x70 0x02 0xff 0xff 0x3e 0xb2 0x00 0x00
0x02 0x04 0x05 0xb4 0x01 0x01 0x04 0x02
7. How many bits are in an MD5 hash?
8. According to the course presentations, what is risk?
What are the two key the components of risk in a qualitative risk management model?
A. ______________________________________________________
B. ______________________________________________________
What are the four actions that can be taken in response to risk?
A. ______________________________________________________
B. ______________________________________________________
C. ______________________________________________________
D. ______________________________________________________
9. A) A company experiences 12 malware outbreaks in a year's time. Each event costs the company $5000 to clean up. What is the annualized loss expectancy (ALE)?
B) According to the course presentations, in designing a solution to the problem in part A, at what point will the firm hit the law of diminishing returns?
10. According to the IP Void web site (Lab), how many Blacklists is the IP address 38.142.184.18 on and why?
11. Why is password complexity ineffective and irrelevant to the security of POP email (ppt)?
12. Explain how SSL/TLS and x.509 support e-Commerce security.
13. Using an online tool covered in one of the lab assignments, explain in detail why the file with the hash "40e8e3b5fce0cd551106ccb86fc83a0ca03c9349" is considered malicious.
14. Review the guidance provided by NIST 800-61 v2 and outline the steps an organization might take when responding to a computer security incident.
15. What encryption algorithm is based upon the difficulty of factoring a large integer into its prime factors?
For each of the following vulnerabilities, list a countermeasure / mitigating control (3 points each - 30 pts total)
16. ARP Spoofing
17. Replay Attack
18. Email Worm Travelling as a Zip Attachment
19. TCP SYN Flood DOS
20. Sniffing Passwords
21. Email Source Address Spoofing
22. Remote Access Trojan Installed by User
23. Clueless Users
24. IP Address Spoofing
25. Dictionary Password Attack
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Given the extensive range of questions I will focus on answering a selection of these to provide a comprehensive understanding of key concepts in cybe...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started