Шукаєте відповіді та рішення тестів для Information Technology and Cyber Security? Перегляньте нашу велику колекцію перевірених відповідей для Information Technology and Cyber Security в lms.upes.ac.in.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
A host machine is joining a network and obtains an IP address automatically using DHCP. Which of the following sequence best describes the DHCP handshake process?
An attacker connects to a corporate network with the following goal: to intercept user credentials and gain administrator access to internal services. To achieve this, the attacker does the following:
Sends a large number of DHCP requests using spoofed MAC addresses until the DHCP pool is exhausted.
Sets up a rogue DHCP server that issues IP addresses along with a fake DNS server address pointing to a malicious website.
Spoofs ARP responses to redirect all local traffic through their machine.
Records a legitimate admin login session and later replays it to gain unauthorized access to internal applications.
Finally, uses elevated shell access gained through a misconfigured internal service to grant themselves permanent admin rights.
Which of the following attacks were performed by the attacker?
Which of the following values are congruent to 1 modulo 9?
An organization implements multiple layers of security to detect and prevent malicious activities:
All incoming and outgoing packets are inspected at Layer 3 and 4 using stateful inspection rules to block suspicious traffic.
External users accessing internal web services are routed through an intermediary server that masks their identity and logs requests.
A decoy server is placed in the internal network that mimics a vulnerable system and is actively monitored for unauthorized access attempts.
An attacker tries to scan ports and access internal resources. Logs show that:
Their IP was blocked after repeated attempts.
All their web requests were captured and traced.
They spent time interacting with a fake internal web server that alerted the security team.
Which of the following statements best describes the deployed security setup?
In a network, a signal travels from one computer through a device that regenerates and retransmits the signal but does not filter or interpret data, and it is then passed on to another device that uses MAC addresses to forward frames only to the intended recipient. Which two devices were used in this sequence?
Component | Purpose |
---|---|
1. PGP | A. X.509 certificates |
2. S/MIME | B. Challenge-response login |
3. SSH | C. Web security |
4. HTTPS | D. Web of trust |
Which of the following values satisfy the congruence : x ≡ 4 mod 9
In the previous question (Q no. 6, where Alice chooses the values p=13, q=17), If Alice encrypts the message M=10, what is the ciphertext C?
(Use : C=Me mod n)
Alice chooses p=13, q=17. She selects e=5. Which of the following statements are true?
Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!