IT security

Western Governors University

Here are the best resources to pass IT security. Find IT security study guides, notes, assignments, and much more.

All 12 results

Sort by

IT Security: Defense against the digital dark arts. Week4: Securing Your Networks
  • IT Security: Defense against the digital dark arts. Week4: Securing Your Networks

  • Exam (elaborations) • 6 pages • 2022
  • Why is normalizing log data important in a centralized logging setup? its difficult to analyze abnormal logs log normalizing detects potential attacks the data must be decrypted before sending it to the log server uniformly formatted logs are easier to store and analyze its difficult to analyze abnormal logs; Incorrect Not quite. Normalization, in this context, means making the format of logs uniform between systems. What type of attacks does a flood guard protect against? Check all that...
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts
  • IT Security: Defense against the digital dark arts

  • Exam (elaborations) • 1 pages • 2022
  • Which of the following do asymmetric cryptosystems provide? Check all that apply. Authenticity Confidentiality Non-repudiation. Confidentiality is provided by the encryption and decryption functionality, while authenticity and non-repudiation are ensured by the signing and verification processes. What advantages do asymmetric algorithms have over symmetric ones? They allow secure communication over insecured channels. By exchanging public keys for encrypting data, asymmetric encryption se...
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts. Week3: AAA Security (Not Roadside Assistance)
  • IT Security: Defense against the digital dark arts. Week3: AAA Security (Not Roadside Assistance)

  • Exam (elaborations) • 5 pages • 2022
  • How is authentication different from authorization? authentication is verifying an identity, authorization is verifying access to a resource; Authentication is proving that an entity is who they claim to be, while authorization is determining whether or not that entity is permitted to access resources. What are some characteristics of a strong password? Check all that apply, is at least eight characters long includes numbers and special characters; A strong password should contain a mix of...
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts Questions and Answers 100% Pass
  • IT Security: Defense against the digital dark arts Questions and Answers 100% Pass

  • Exam (elaborations) • 54 pages • 2022
  • Phishing, baiting, and tailgating are examples of ________ attacks. Malware Password Social engineering Network Social engineering An attacker could redirect your browser to a fake website login page using what kind of attack? Injection attack DNS cache poisoning attack DDoS attack SYN flood attack DNS cache poisoning attack A(n) _____ attack is meant to prevent legitimate traffic from reaching a service. Injection Password Denial of Service DNS Cache poisoning Denial of Service
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts. Week2: Pelcgbybtl (Cryptology) Already Passed
  • IT Security: Defense against the digital dark arts. Week2: Pelcgbybtl (Cryptology) Already Passed

  • Exam (elaborations) • 5 pages • 2022
  • What are the components that make up a cryptosystem? Check all that apply encryption algorithms decryption algorithms key generation algorithms; A cryptosystem is a collection of algorithms needed to operate an encryption service. This involves generating encryption keys, as well as encryption and decryption operations. What is steganography? the practice of hiding messages; Steganography involves hiding messages, but not encoding them. What makes an encryption algorithm symmetric? the s...
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts already passed
  • IT Security: Defense against the digital dark arts already passed

  • Exam (elaborations) • 1 pages • 2022
  • In the CIA Triad, "Confidentiality" means ensuring that data is: not accessible by unwanted parties In the CIA Triad, "Integrity" means ensuring that data is: accurate and wasn't tampered with In the CIA Triad, "Availability" means ensuring that data is: available and people can access it What's the relationship between a vulnerability and an exploit? An exploit takes an advantage of a vulnerability to run arbitrary code or gain access.
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts Questions and Answers Rated A
  • IT Security: Defense against the digital dark arts Questions and Answers Rated A

  • Exam (elaborations) • 5 pages • 2022
  • Authn is short for ________. Authentication. Authz (Authorization) Authorization is concerned with determining ______ to resources. access. Authorization deals with determining access to resources In addition to the client being authenticated by the server, certificate authentication also provides ______. Server authentication. The client will validate the server's certificate, thereby providing server authentication and client authentication. Kerberos uses _____ as authentication tokens....
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed
  • IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed

  • Exam (elaborations) • 3 pages • 2022
  • Plaintext is the original message, while _____ is the encrypted message. Cyphertext The specific function of converting plaintext into ciphertext is called a(n) ______. x***** permutation Encryption algorithm Studying how often letters and pairs of letters occur in a language is referred to as _______. frequency analysis True or false: The same plaintext encrypted using the same algorithm and same encryption key would result in different ciphertext outputs. false The practice of hiding me...
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts. Week1: Understanding Security Threats
  • IT Security: Defense against the digital dark arts. Week1: Understanding Security Threats

  • Exam (elaborations) • 6 pages • 2022
  • In the CIA Triad, "Confidentiality" means ensuring that data is: not accessible by unwanted parties; "Confidentiality," in this context, means preventing unauthorized third parties from gaining access to the data. In the CIA Triad, "Integrity" means ensuring that data is: accurate and was not tampered with; "Integrity," in this context, means ensuring that the data remains intact, uncorrupted, and not tampered with. The data that gets sent is the exact same as the data that gets rec...
    (0)
  • $7.99
  • + learn more
IT Security: Defense against the digital dark arts questions and answers with complete solutions
  • IT Security: Defense against the digital dark arts questions and answers with complete solutions

  • Exam (elaborations) • 2 pages • 2022
  • Why is normalizing log data important in a centralized logging setup? Uniformly formatted logs are easier to store and analyze. Logs from various systems may be formatted differently. Normalizing logs is the practice of reformatting the logs into a common format, allowing for easier storage and lookups in a centralized logging system. What type of attacks does a flood guard protect against? Check all that apply. DDoS Attack SYN Floods. A flood guard protects against attacks that overwhelm n...
    (0)
  • $7.99
  • + learn more