Шукаєте відповіді та рішення тестів для Information Technology and Cyber Security? Перегляньте нашу велику колекцію перевірених відповідей для Information Technology and Cyber Security в lms.upes.ac.in.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
Kerberos authentication involves:
Which are valid DMZ configurations?
Which of the following are critical business data that should be backed up? (Select all that apply)
Match the following:
Column A (Protocol) | Column B (Description) |
---|---|
1. PGP | A. Encrypts individual HTTP messages, used for server authentication |
2. S/MIME | B. Provides end-to-end security at the IP layer, encrypts each packet |
3. S-HTTP | C. Uses RSA for email encryption, requires X.509 certificates |
4. IPsec | D. Combines symmetric and asymmetric encryption for email/files |
5. TLS | E. Supersedes SSL, uses Handshake and Record protocols |
Which RAID levels provide fault tolerance? (Select all that apply)
A host machine is joining a network and obtains an IP address automatically using DHCP. Which of the following sequence best describes the DHCP handshake process?
An attacker connects to a corporate network with the following goal: to intercept user credentials and gain administrator access to internal services. To achieve this, the attacker does the following:
Sends a large number of DHCP requests using spoofed MAC addresses until the DHCP pool is exhausted.
Sets up a rogue DHCP server that issues IP addresses along with a fake DNS server address pointing to a malicious website.
Spoofs ARP responses to redirect all local traffic through their machine.
Records a legitimate admin login session and later replays it to gain unauthorized access to internal applications.
Finally, uses elevated shell access gained through a misconfigured internal service to grant themselves permanent admin rights.
Which of the following attacks were performed by the attacker?
Which of the following values are congruent to 1 modulo 9?
An organization implements multiple layers of security to detect and prevent malicious activities:
All incoming and outgoing packets are inspected at Layer 3 and 4 using stateful inspection rules to block suspicious traffic.
External users accessing internal web services are routed through an intermediary server that masks their identity and logs requests.
A decoy server is placed in the internal network that mimics a vulnerable system and is actively monitored for unauthorized access attempts.
An attacker tries to scan ports and access internal resources. Logs show that:
Their IP was blocked after repeated attempts.
All their web requests were captured and traced.
They spent time interacting with a fake internal web server that alerted the security team.
Which of the following statements best describes the deployed security setup?
In a network, a signal travels from one computer through a device that regenerates and retransmits the signal but does not filter or interpret data, and it is then passed on to another device that uses MAC addresses to forward frames only to the intended recipient. Which two devices were used in this sequence?
Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!