100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SEC-250 Questions and answers latest update $10.99   Add to cart

Exam (elaborations)

SEC-250 Questions and answers latest update

 1 view  0 purchase
  • Course
  • Institution

SEC-250 Questions and answers latest update What does it mean to say that a Certificate Authority "signs" another party's digital certificate? When a certificate authority signs another party's digital certificate, they are saying that they trust that party, therefore creating a web of trust. The...

[Show more]

Preview 2 out of 7  pages

  • June 27, 2024
  • 7
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
SEC-250 Questions and answers latest
update
What does it mean to say that a Certificate Authority "signs" another party's digital certificate?
When a certificate authority signs another party's digital certificate, they are saying that they trust
that party, therefore creating a web of trust. The CA performs a mathematical function involving their
private key to generate a public key for the applicant


What is the purpose of a Certificate Authority?
The purpose of a Certificate Authority is to provide certificates and sign off on other certificates
creating a web of trust. An example of a certificate authority is Go Daddy.


What is the purpose of using TLS/SSL
The purpose of TLS/SSL is to ensure that the website you are on is secure and that any information
you give to that site will be secure when being transmitted.


Define an Advanced Persistent Threat.
An Advanced Persistent Threat is a threat from a group of people, like the government who can
persistently have a reason to threaten another group of people or person.


How does one typically transport data between an air gap network and another network?
An air gap network is a network that is physically separated from all other networks. Any data that is
transported to an air gap network from another network has to be carefully examined before it can
enter.


What is the difference between a virus and a worm?
A virus requires some sort of user interaction whereas a worm can self replicate and doesn't require
user interaction.


Describe the behavior/purpose of a trojan and a rootkit
A Trojan is a backdoor that is normally part of a larger attack and is done through remote access. A
root kit hides malware and a file integrity check can be used to combat root kits.


How does "fuzzing" during the development process help create more secure web applications?
Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that
involves providing invalid, unexpected, or random data to the inputs of a computer program. If
vulnerabilities are discovered before a program is released, developers can prevent their software
from being exploited in the wild.


Why do web servers present an increased level of exposure?
By design web servers are always on, are always connected to the internet, must always have
adequate available resources to serve clients, and must accept connections from any (unknown)
client. This makes them a common target.


In regard to Web Server security, what is a Honey Pot?
A Honey Pot is a website that has information and is purposefully insecure in hopes that someone
who has a new virus will use the virus on this website. That way, we can learn more about the virus
before it attacks an actual website with real information.

, Why would an organization use an application-level filter to inspect all outgoing mail as well as
incoming?
An organization might want to look for incoming spam phishing attempts, scan incoming mail for
viruses, or monitor outgoing mail to detect an infected mail server.


Describe the difference between a stateless and a stateful packet filter:
A stateless packet filter looks at incoming and outgoing packets and accepts or denies packets based
on criteria like source and destination IP address, Protocol, or Port number. It does not compare
packets to any previous packets that have traversed the firewall. A stateful packet filter can monitor a
session between an internal host and an external server. It can allow response packets from external
servers based on an pre-established session.


What is a Cross Site Scripting attack?
XSS attacks web Bad code. If the text inputted by the user is reflected back and has not been data
validated (or sanitized) the browser will interpret the inputted script as part of the mark up and
execute the code accordingly. An XSS attack consists of an attacker taking advantage of this.


Describe a SQL injection attack
An SQL injection attack is when a hacker tries to get information from a database by using a web
form. You can run SQL commands to get certain information.


Commonly a hacker's goal is to reach the point where they can execute 'arbitrary code' on a remote
system. What exactly does 'arbitrary code' mean?
'Arbitrary code' refers to an attacker's ability to run any command they choose. This implies that they
have root or administrator level access.


What does non-repudiation mean? How are digital signatures used in repudiation disputes?
Non-repudiation is 'an authentication that can be asserted to be genuine with high assurance',
meaning we can believe beyond a reasonable doubt that an individual did something and they are
unable to deny it. By digitally signing a document, others can use our public key to verify beyond a
reasonable doubt that we created the document.


What is a logic bomb?
A logic bomb is any code that is set to execute when a certain condition or event transpires in the
future. They are often employed by criminals to hide their tracks in the case that they're caught.


How does a DNS amplification attack work?
An attacker sends a small request to a public DNS server soliciting a large amount of data in response.
The attacker supplies a sources address of its victim so that the size-amplified reply packets are sent
to the victim, possibly creating a Denial of Service condition.


Describe AAA
Authentication is how you identity yourself with something you know(a password), something you
have(a key card or smart card) or something you are(your fingerprint or retina).
Authorization is making sure that only the people that need to have and see certain information are
authorized to do so whereas people who shouldn't have access to it, can't.
Accounting is keeping of logs and records of things like smart card swipes.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

70840 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart