Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

What type of web server is sending packet/frame 280 of the capture? 2. What type of HTTP Status Code is the web server in

What type of web server is sending packet/frame 280 of the capture?

 

2. What type of HTTP Status Code is the web server in packet/frame 314 sending? Google the error and provide a quote summarizing the nature of the error as well as an MLA formatted reference for that quote.

 

For question 3, open the file telnet.dmp

 

3. What is the user name and password provided to the telnet server in the file telnet.dmp? Was the authentication successful? Note: Right click the link to the file and select "Save As" to save the file.

 

4. Define the following terms:

       a. cryptography

       b. cryptanalysis

       c. non-repudiation

       d. diffusion (in the context of cryptography)

       e. confusion (in the context of cryptography)

 

5. According to the course presentations, what is the name (A) of the only unbreakable cryptosystem created to date, who (B) invented it, where did they work (C), and what year did they invent it (D)?

 

                        A. ______________________________________________________

 

            

                        B. ______________________________________________________

 

 

                        C. ______________________________________________________

 

                        

                        D. ______________________________________________________

 

 

 

 

6. What is the destination address in the following TCP/IP header?

0x45 0x00 0x00 0x30 0x43 0x91 0x00 0x00 0x71 0x06 

0xcd 0x30 0xd5 0x96 0x5b 0xa6 0xc0 0xa8 0x01 0x01   

0x91 0x34 0x17 0x0c 0x37 0xca 0xbd 0x60 0x79 0xfe \0xf3 0xfc 0x70 0x02 0xff 0xff 0x3e 0xb2 0x00 0x00 

0x02 0x04 0x05 0xb4 0x01 0x01 0x04 0x02

 

7. How many bits are in an MD5 hash?

 

8. According to the course presentations, what is risk?

 

 

 

 

 

 

 

 

What are the two key the components of risk in a qualitative risk management model?

 

                        A. ______________________________________________________

 

            

                        B. ______________________________________________________

 

 

What are the four actions that can be taken in response to risk?

 

                        A. ______________________________________________________

 

            

                        B. ______________________________________________________

 

 

                        C. ______________________________________________________

 

                        

                        D. ______________________________________________________

 

 

9. A) A company experiences 12 malware outbreaks in a year's time. Each event costs the company $5000 to clean up. What is the annualized loss expectancy (ALE)?

    B) According to the course presentations, in designing a solution to the problem in part A, at what point will the firm hit the law of diminishing returns? 

 

10. According to the IP Void web site (Lab), how many Blacklists is the IP address 38.142.184.18 on and why?

 

11. Why is password complexity ineffective and irrelevant to the security of POP email (ppt)?

 

12. Explain how SSL/TLS and x.509 support e-Commerce security.

 

13. Using an online tool covered in one of the lab assignments, explain in detail why the file with the hash "40e8e3b5fce0cd551106ccb86fc83a0ca03c9349" is considered malicious.

 

14. Review the guidance provided by NIST 800-61 v2 and outline the steps an organization might take when responding to a computer security incident.

 

15. What encryption algorithm is based upon the difficulty of factoring a large integer into its prime factors?

 

For each of the following vulnerabilities, list a countermeasure / mitigating control (3 points each - 30 pts total)

 

16. ARP Spoofing

 

17. Replay Attack

 

18. Email Worm Travelling as a Zip Attachment

 

19. TCP SYN Flood DOS

 

20. Sniffing Passwords

 

21. Email Source Address Spoofing

 

22. Remote Access Trojan Installed by User

 

23. Clueless Users

 

24. IP Address Spoofing

 

25. Dictionary Password Attack

Step by Step Solution

There are 3 Steps involved in it

Step: 1

Given the extensive range of questions I will focus on answering a selection of these to provide a comprehensive understanding of key concepts in cybe... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Information Systems

Authors: Patricia Wallace

2nd edition

9780133807486, 133571750, 133807487, 978-0133571752

More Books

Students also viewed these Databases questions

Question

How can human behavior pose challenges for a KM project?

Answered: 1 week ago