Looking for Information Technology and Cyber Security test answers and solutions? Browse our comprehensive collection of verified answers for Information Technology and Cyber Security at lms.upes.ac.in.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Which of the following are disadvantages of RAID systems? (Select all that apply)
Below are the two statements:
i) PGP and S/MIME both use X.509 certificates for key exchange.
ii) SSL and TLS operate at the application layer of the OSI model.
Choose the correct option for the above two statements.
DNS Poisoning | A. Switch MAC address tables
MAC Spoofing | B. DNS resolver cache
SYN Flood | C. TCP/IP three-way handshake
Brute Force | D. Weak password policies
Which are valid wireless threats?
Kerberos authentication involves:
What is the primary function of an Intrusion Prevention System (IPS) compared to an IDS?
Based on the DDoS Attack Diagram , what role do Zombie systems play? (Select all that apply)
Consider the following statements:
i) A public key can decrypt messages encrypted with a private key.
ii) Hashing is reversible if you know the algorithm.
iii) A honeypot has production value and is used to host critical enterprise applications.
Which are valid DMZ configurations?
| Column A (Device) | Column B (Function) |
|---|---|
| 1. Proxy Server | A. Logs keystrokes of attackers |
| 2. Honeypot | B. Filters harmful websites |
| 3. Internet Content Filter | C. Acts as intermediary for client requests |
| 4. Protocol Analyzer | D. Captures and decodes network packets |