logo

Crowdly

Information Technology and Cyber Security

Шукаєте відповіді та рішення тестів для Information Technology and Cyber Security? Перегляньте нашу велику колекцію перевірених відповідей для Information Technology and Cyber Security в lms.upes.ac.in.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

A host machine is joining a network and obtains an IP address automatically using DHCP. Which of the following sequence best describes the DHCP handshake process?

0%
0%
100%
0%
Переглянути це питання

An attacker connects to a corporate network with the following goal: to intercept user credentials and gain administrator access to internal services. To achieve this, the attacker does the following:

  1. Sends a large number of DHCP requests using spoofed MAC addresses until the DHCP pool is exhausted.

  2. Sets up a rogue DHCP server that issues IP addresses along with a fake DNS server address pointing to a malicious website.

  3. Spoofs ARP responses to redirect all local traffic through their machine.

  4. Records a legitimate admin login session and later replays it to gain unauthorized access to internal applications.

  5. Finally, uses elevated shell access gained through a misconfigured internal service to grant themselves permanent admin rights.

Which of the following attacks were performed by the attacker?

100%
0%
0%
0%
Переглянути це питання

Which of the following values are congruent to 1

modulo 9?

60%
100%
100%
40%
Переглянути це питання

An organization implements multiple layers of security to detect and prevent malicious activities:

  1. All incoming and outgoing packets are inspected at Layer 3 and 4 using stateful inspection rules to block suspicious traffic.

  2. External users accessing internal web services are routed through an intermediary server that masks their identity and logs requests.

  3. A decoy server is placed in the internal network that mimics a vulnerable system and is actively monitored for unauthorized access attempts.

An attacker tries to scan ports and access internal resources. Logs show that:

  • Their IP was blocked after repeated attempts.

  • All their web requests were captured and traced.

  • They spent time interacting with a fake internal web server that alerted the security team.

Which of the following statements best describes the deployed security setup?

100%
0%
0%
0%
Переглянути це питання

In a network, a signal travels from one computer through a device that regenerates and retransmits the signal but does not filter or interpret data, and it is then passed on to another device that uses MAC addresses to forward frames only to the intended recipient. Which two devices were used in this sequence?

100%
0%
0%
0%
Переглянути це питання

Alice uses PGP to send a secure message to Bob. She signs the message with her private key and encrypts it with Bob’s public key. Which of the following is/are true?

60%
40%
100%
0%
Переглянути це питання

Match the following components with their primary purpose:

ComponentPurpose
1. PGPA. X.509 certificates
2. S/MIMEB. Challenge-response login
3. SSHC. Web security
4. HTTPSD. Web of trust

60%
0%
40%
0%
Переглянути це питання

Which

of the following values satisfy the congruence : x ≡ 4 mod 9

100%
80%
80%
100%
Переглянути це питання

In the previous question (Q no. 6, where Alice chooses the values p=13, q=17), If Alice encrypts

the message M=10, what is the ciphertext C? 

(Use : C=Me mod n)

Переглянути це питання

Alice chooses p=13, q=17. She selects e=5. Which

of the following statements are true?

60%
60%
60%
100%
Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на lms.upes.ac.in?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!