100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials! €9,31
In winkelwagen

Tentamen (uitwerkingen)

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!

 1 keer verkocht
  • Vak
  • Instelling

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials! 1. Honeypots _____ are decoy systems designed to lure potential attackers away from critical systems 2. Hash ____ functions are mathematical algorithms that generate a message summary or digest to confirm t...

[Meer zien]

Voorbeeld 3 van de 21  pagina's

  • 16 november 2024
  • 21
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
avatar-seller
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!

1. Honeypots
_____ are decoy systems designed to lure potential attackers away from critical
systems
2. Hash
____ functions are mathematical algorithms that generate a message summary or
digest to confirm the identity of a specific message and to confirm that there have not
been any changes to the content
3. certificate authority
3. ______issues, manages, authenticates, signs, and revokes users' digital certificates
4. symmetric
4. Encryption methodologies that require the same secret key to encipher and decipher
the message are using what is called _____
5. Decryption
5. _____ is the process of converting the ciphertext message back into plaintext so that
it can be readily understood.
6. demilitarized zone or DMZ
6. In computer security ______ is a semiprivate network that contains and exposes an
organization's external-facing services to a larger and untrusted network such as the
Internet.
7. certificate
7. A digital _______ is an electronic document or container file that contains a key value
and identifying information about the entity that controls the key.
8. Router
8. _____ is a device that interconnects two or more networks and selectively
interchanges packets of data between them.
9. Logic bomb
9. _____ is a program that executes a malicious function of some kind when it detects
certain conditions.
10. GLBA
10. _____ is the U.S. security-related act that addresses the privacy and security of
consumer financial information.
timing
11. In a ____ attack, the attacker eavesdrops during the victim's session and uses
statistical analysis of patterns and inter-keystroke timings to discern sensitive session
information.
a. replay c. correlation
b. timing d. dictionary
SOX
12. The main goal of ____ is to protect investors from financial fraud.
--GLBA
--CIPA

,--FISMA
--SOX
Confidentiality
13. Which of the following about information security is provided by symmetric-key
systems.
---Non-repudiation
---Confidentiality
---Integrity
---Authentication
SYN flood
14. Which type of attack results in legitimate users not having access to a system
resource?
---Man in the Middle
---Replay
---Trojan
---SYN flood
Digital certificates
15. Which of the following help us solve the key distribution problem of the symmetric-
key cryptography?
---Digital certificates
---Hash functions
---Triple DES
---Routers
16. False
16. Hash functions require the use of keys.
True/False
True
17. Popular cryptosystems use a hybrid combination of symmetric and asymmetric
algorithms.
True/False
18. True
18. The AES algorithm is a public key encryption algorithm
True/False
19. False
19. A stateful inspection firewall doesn't allow packets directly between systems on
opposite sides of the firewall but opens separate connections with each of the parties.
True/False
20. False
20. FERPA applies to all educational institutions of the US.
True/False
Information provided on a company's website. It is public so not confidential but
it should not have been tampered with and it should have been posted by the
legitimate company
21. Describe a scenario where information is not confidential but its integrity and
authenticity are crucial.

, --Define the assessment plan.
--Identify in-scope and out-of-scope objectives.
--Establish assessment benchmarks and baselines.
--Collect assessment data and conduct interviews.
--Target applications, connections, protocols, services, or users to exploit
--Validate security mechanisms and identify true weaknesses.
22. (3pts)The following procedures for assessing system security are out of order. Sort
them in the order of priority.
--Identify in-scope and out-of-scope objectives.
--Validate security mechanisms and identify true weaknesses.
--Define the assessment plan.
--Collect assessment data and conduct interviews.
--Establish assessment benchmarks and baselines.
--Target applications, connections, protocols, services, or users to exploit
Physical addressing------Data link

Data format; encryption----Presentation

Signaling----Physical

End-to-end communication-----Transport

Routing data; logical addressing-------Network

User interface------Application

Process to process communication-----Session

ans 7,5,6,4,3,2,1
23. (7pts) Match the OSI Network layers with their functions.

Functions
Physical addressing
Data format; encryption
Signaling
End-to-end communication
Routing data; logical addressing
User interface
Process to process communication

Layers
1. Session
2. Application
3. Network
4. Transport
5. Presentation

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, Bancontact of creditcard en je bent klaar. Geen abonnement nodig.

Focus op de essentie

Focus op de essentie

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper TopGradeSolutions. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €9,31. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67479 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Start met verkopen

Laatst bekeken door jou


€9,31  1x  verkocht
  • (0)
In winkelwagen
Toegevoegd