Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Exam Questions

Part 1:

True (T) or False (F).

IMPORTANT: If you answer False (F), then you MUST say WHY it is in a few words to receive full credit. (5 questions at 2point each, 10 points in all)

EXAMPLE QUESTIONS ONLY

T F Your Professor's last name is Douglas. Answer: ___F___ (it is Kelly)

T F This course is INFO610. Answer: ___T___


1. T F Deep packet inspection firewalls protect networks by blocking packets based on the packets' header information at the network (IP) layer. Answer: _____

If F, why? Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment.

This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications. Answer: _____

2. T F Intrusion Detection Systems (IDS) provide no protection from internal threats. Answer: _____

3. T F A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. Answer: _____

4. T F Security awareness, training, and education programs are key components of organizational risk management strategies.

Answer: _____


Part 2: Multiple Choice Questions. Print the correct answer in the blank following the question. (22 questions at 2 points each, 40 points plus 4 bonus points in all)

1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below):

A. Network 1. Coordinates communication between applications.

B. Physical 2. Supports useful functions over the transport layer such identity/location of applications.

C. Application 3. Moves information between hosts that are not directly connected.

D. Transport 4. Moves bits between the nodes in the network.

a. A--->3; B--->4; C--->2; D--->1

b. A--->2; B--->4; C--->1; D--->4

c. A--->2; B--->3; C--->4; D--->1

d. A--->3; B--->4; C--->1; D--->2

Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:

a. A patent

b. A copyright

c. A trademark

d. Ethical standards

Answer: _____

3. Security threats include which of the following:

a. Unlocked doors

b. Disgruntled employees

c. Hurricanes

d. Un-patched software programs

e. All of the above

Answer: _____

4. Denial of service attacks include (select one or more):

a. Buffer overflow attack

b. Smurf attack

c. Ping flood attack

d. SYN flood attack

e. All of the above

Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server.

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016. This is an example of which of the following attacks?

a. Virus

b. Logic Bomb

c. Spoofing

d. Trojan horse

e. Botnet

f. Rootkit

g. Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process.

Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret.

They would like to protect this formula for as long as possible.

What type of intellectual property protection best suits their needs?

a. Copyright

b. Trademark

c. Patent

d. Trade Secret

Answer: _______

7. You should clear cookies in your browser periodically because:

a. They (Cookies) can be used to track your web browsing behavior and invade your privacy.

b. They can facilitate impersonation attacks.

c. They can be used to spread viruses.

d. a. & b.

e. b. & c.

f. a., b. & c.

Answer: _________

8. A TCP/IP session hijacking can be best described as:

a. Providing false identity information to gain unauthorized access

b. Establishing a connection without specifying a username or password

c. An attacker takes control of a session between the server and a client

d. Flooding the connection with too many requests

Answer: _________

9. Tracker attacks in databases get around:

a. Anonymization

b. Data transformation

c. Query size restriction

d. Data partitioning
Answer: _________

10. A race condition attack can result in:

a. A symbolic link

b. Object orientation

c. A deadlock

d. Access to low address memory locations

Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.

a. Data perturbation

b. Database access control

c. Inference channeling

d. Output perturbation

Answer: _________

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.

a. compromise

b. inference

c. partitioning

d. query restriction

Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?

a. IPSec

b. HTTP over SSL

c. Link encryption

d. Microsoft Encrypting File System (EFS)

Answer: ______

14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers.

Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised.

Which of the following solutions are you most likely to implement?

a. A firewall system at the connection point to the Internet

b. An improved RBAC-based access control system for the application servers

c. File-level encryption

d. Kerberos authentication

Answer: _______

15. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?

a. A privacy policy

b. An authentication policy

c. An incident response policy

d. Wireless network access policy

Answer: ________

16. The security risk of allowing dynamic content ( to execute) on a target machine is:

a. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.

b. Malware may be included in the downloaded code and infect the target machine.

c. The mobile code author may never be known.

d. None of the above.

Answer: _______

17. Encrypting a message with a private key (of the sender) in an asymmetric system provides:

a. Proof of receipt

b. Confidentiality

c. Proof of origin

d. Message availability

Answer:_______

18. The correct ordering of the upper layers of the OSI model are:

a. Session, application, presentation

b. Session, presentation, application

c. Session, application, presentation, physical

d. Application, presentation, session, network

Answer: _______

19. In relational database parlance, the basic building block is a __________, which is a flat table.

a. attribute

b. tuple

c. primary key

d. relation

e. field

Answer: _____

20. Routers operate at the _____________ of the OSI stack?

a. Transport

b. Application

c. Session

d. Network

e. Data Link

Answer: _____

21. Gateways operate at the _____________ of the OSI stack?

a. Transport

b. Application

c. Session

d. Network

e. Data Link

Answer: _____

22. Which e-mail security protocol(s) depend(s) upon a "Web of Trust"?

a. Kerberos

b. Public Key Infrastructure (PKI)

c. Secure Sockets Layer (SSL)

d. Transport Layer Security (TLS)

e. Pretty Good Privacy (PGP)

f. Secure Multipurpose Internet Mail Extensions (S/MIME)

g. Privacy Enhanced Mail (PEM)

h. Data Link

Answer: _____

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91596862
  • Price:- $22

Priced at Now at $22, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As