100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSE 4471 Final Exam Questions and Answers 100% Pass $16.99   Add to cart

Exam (elaborations)

CSE 4471 Final Exam Questions and Answers 100% Pass

 4 views  0 purchase
  • Course
  • CSE 4471
  • Institution
  • CSE 4471

CSE 4471 Final Exam Questions and Answers 100% Pass

Preview 4 out of 55  pages

  • October 14, 2024
  • 55
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSE 4471
  • CSE 4471
avatar-seller
TheeGrades
CSE 4471 Final Exam Questions and Answers 100% Pass

Internet Control Message Protocol. It is used by network devices to send error messages
indicating, for example, that a requested service is not available (i.e. ping - could not find
host) Correct Ans-What does ICMP stand for and what is it?




Used by hosts, routers, gateways to communicate network-level information ■

- Error reporting: unreachable host, network, port, protocol ■

- Echo request/reply (used by ping) ■ Correct Ans-What is ICMP used for?




Autonomous Systems (AS) Correct Ans-The Global Internet consists of ____________
interconnected with each other:




Stub AS: small corporation! ■

Multihomed AS: large corporation (no transit)! ■

Transit AS: provider ■ Correct Ans-The global internet consists of these 3 AS's




- Microprocessor ■

- ROM ■

- RAM ■

- Digital signal processor ■

- Radio module ■

- Microphone and speaker ■

, CSE 4471 Final Exam Questions and Answers 100% Pass
- Hardware interfaces ■

- LCD display ■ Correct Ans-What is inside a smartphone?




Weakness or fault that can lead to an

exposure Correct Ans-define Vulnerability




Generic term for objects, people who pose a potential danger to an asset (via attacks)!
Correct Ans-define Threat




Specific object, person who poses such

a danger (by carrying out an attack) ■

DDoS attacks are a threat; if a hacker carries out a

DDoS attack, he's a threat agent Correct Ans-define Threat agent




Probability that "something bad" happens times

expected damage to the organization ■

Unlike vulnerabilities/exploits; e.g., a web service running on a server may have a
vulnerability, but if it's not

connected to the network, risk is 0 Correct Ans-define Risk




a successful attack Correct Ans-define Exposure

, CSE 4471 Final Exam Questions and Answers 100% Pass
how the attack was carried out, e.g., malicious email attachment.




a path or means by which a hacker can gain access to a computer or network server in order
to deliver a payload or malicious outcome Correct Ans-define Vector




malicious codes such as viruses, worms,

Trojan horses, bots, backdoors, spyware, adware, etc. Correct Ans-define Malware




the act of disclosing information. responsible, full, partial, none, delayed, etc. Correct Ans-
define Disclosure




determining the identity of a person,

computer, or service on a computer Correct Ans-define Authentication




determining whether an entity (person,

program, computer) has access to object

Can be implicit (email account access) or explicit (attributes specifying users/groups who can
read/write/

execute file) Correct Ans-define Authorization




definitions vary

Any attack, all attacks using vulnerability X, etc.

, CSE 4471 Final Exam Questions and Answers 100% Pass
Anything resulting in service degradation other than

problem mgmt., service request fulfillment Correct Ans-define Incident




Computer Security Institute Correct Ans-What does CSI stand for?




-Decide whether to distribute handsets to employees for

business purposes, allow use ■

- Encrypt device data ■

- Remote data wipe as needed ■

- Procure, install anti-malware, firewall products ■

- Require VPN use, strong passwords, inventory mgmt. ■

- Monitor employee handset use to detect attacks ■

- Educate employees about the threatspace, train them to ■

treat handsets as any other computer system

- Prevent, detect, and respond appropriately ■ Correct Ans-What are some risk
management tactics for mobile phones?




acts of human error or failure Correct Ans-What is the most common threat to information
security?




Employees Correct Ans-__________ are among the greatest threats to

an organization's data

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$16.99
  • (0)
  Add to cart