SEC Question and answers already passed SEC + BOLC Final
Which IPSEC protocol provides confidentiality and integrity? - correct answer ESP
Which of these protocols uses x.509 certificates? - correct answer S/MIME
Where are bastion hosts placed? - correct answer DMZ
Which level o...
SEC + BOLC Final
Which IPSEC protocol provides confidentiality and integrity? - correct answer
✔ESP
Which of these protocols uses x.509 certificates? - correct answer ✔S/MIME
Where are bastion hosts placed? - correct answer ✔DMZ
Which level of the OSI model is concerned with MAC addresses? - correct
answer ✔Data Link
Using zero compression, what would be the IPV6 address for
fe80:0000:0000:0000)0c02:0023:5001:8760 be? - correct answer
✔fe80::c02:23:5001:8760
what is the name of the browser protocol that the client uses to contact the CA
directly and ask about the revocations status of a particular certificate? -
correct answer ✔CRL
Which one of these is not a hashing algorithm? - correct answer ✔ECC
Which of these algorithms is an asymmetric algorithm that is only used for key
exchange/key agreement? - correct answer ✔Diffie Helmen
Which of these symmetric algorithms was not a finalist for the advance
encryption standard? - correct answer ✔Blowfish
, you have a cipher text of 100011001 and a key string of 10101010 what would
your plain text be using XOR? - correct answer ✔00110011
Which of these block cipher modes is designed to operate like a stream
cipher? - correct answer ✔Cipher feedback
Obviously encrypted messages can draw unwanted attention. what is one way
to present an encrypted message without showcasing its existence? - correct
answer ✔Stenography
XML queries used an xml injection attack are different from sql queries but the
principles and exploits are similar. True or False? - correct answer ✔True
A secure web application will both sanitize and validate input which in term will
help protect it against ? - correct answer ✔SQL injection, Cross Site
Scripting, Cross Site Request Forgeries, All of the above
Another name for race condition is? - correct answer ✔Time of check to time
of use
Which of these application exploits is an effective denial of service attack? -
correct answer ✔Resource exhaustion
Bluejacking is an attack against ? - correct answer ✔blue tooth device
Which of the following wireless security protocols utilizes the RC4 streaming
encryption algorithm and has serious vulnerabilities in its initialization vector
setup process? - correct answer ✔WEP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Academia199. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.