100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ICT EXAM QUESTIONS & ANSWERS 2024 UPDATE | 100% CORRECT

Beoordeling
-
Verkocht
-
Pagina's
14
Cijfer
A+
Geüpload op
08-02-2024
Geschreven in
2023/2024

ICT EXAM QUESTIONS & ANSWERS 2024 UPDATE | 100% CORRECT Select one: a. Install endpoint protection software on the client machine b. Implement bounds checking on the input string c. Compile the program with stack canaries d. Prevent the user from specifying the length of the input string e. Enable address space layout randomisation Question text Which of the following doesn’t attach to a file but can replicate itself? Select one: a. Virus b. Buffer overflow c. Trojan d. Worm Select one: a. Using a type-safe language. b. Using a firewall. c. Using encryption. d. Using passwords to authenticate users. Question text People exaggerate risks that are: Select one: a. Non-existent b. Well understood c. Unfamiliar d. Common Question text Which of the following is a limitation of dictionary attacks? Select one: a. Ineffective against complex passwords b. Requires the password to be stored as plaintext c. Must wait for password to be transmitted d. Relies on lack of input validation in login field e. Ineffective against salted passwords Brute force attack Question 8. A network admin has noticed a high level of TCP traffic in and out of the network. After investigating the traffic with Wireshark, he discovered malformed TCP ACK packets with unauthorized data. What has he discovered? Select one: a. TCP port scanning b. Buffer overflow c. DoS attack d. Covert channel Two commonly used methods for request and response between client and server are: GET and POST • GET method -Client ends HTTP Requests data from specified resource to server. • POST - Server submits data to be processed to client specified resource. HTTP Common Request Methods The Attacker can attack by modifying ‘acct’ parameter in their browser to send whatever account number they want. In the java code below, String query = "SELECT * FROM accts WHERE account = ?"; PreparedStatement pstmt = reStatement(query, … ); String(1, Parameter("acct")); ResultSet results = teQuery(); If not verified, attacker can access any user’s account 1. it is a 2 factor authentication. 2, yes it is 2 factor authentication because it uses pin and key fob to authenticate. And both pin and key fobs must be valid in order to work. 3. It can be further strengthen by using biometric recognition technology as the fingerprint can only be found on the individual user itself. Finger print is unique for every person and cannot be replicated. Not yet answered Cannot provide digital signatures that cannot be repudiated In an asymmetric cryptography system, there are two different keys used for the encryption and decryption of data. The key used for encryption is kept public and so as called public key, and the decryption key is kept secret and called private key. The sender and the receiver have two keys in an asymmetric system. However, the private key is kept private and not sent over with the message to the receiver, although the public key is. A symmetric cryptography system, has only one key for both encryption and decryption. The key used for encryption and decryption is called the private key and only people who are authorized for the encryption/decryption would know it. In a symmetric cryptography system, the encrypted message is sent over without any public keys attached to it. ADVANTAGES of symmetric crypto system - Encryption is faster. - Encrypted data can be transferred on the link even if there is a possibility that the data will be intercepted. - It uses password authentication to verify the receiver’s identity. • - decrypting a message is done only using secret key. Disadvantages of symmetric crypto system: - Cannot provide digital signatures that cannot be repudiated. Design flaws: flaws that exist during the design of software, during the development of the software . Implementation flaws: flaws that exist when a software is being implemented as part of testing procedures and processes before the software is being deployed. The first encryption technique flaw is design flaws as the encryption is related to the software of the system. the second buffer overflow is implementation flaw as it deals with Inappropriate checking/sanitation of user input. 3 main entities are bot master, command and control and bot. Not yet answered Cannot provide digital signatures that cannot be repudiated In an asymmetric cryptography system, there are two different keys used for the encryption and decryption of data. The key used for encryption is kept public and so as called public key, and the decryption key is kept secret and called private key. The sender and the receiver have two keys in an asymmetric system. However, the private key is kept private and not sent over with the message to the receiver, although the public key is. A symmetric cryptography system, has only one key for both encryption and decryption. The key used for encryption and decryption is called the private key and only people who are authorized for the encryption/decryption would know it. In a symmetric cryptography system, the encrypted message is sent over without any public keys attached to it. ADVANTAGES of symmetric crypto system - Encryption is faster. - Encrypted data can be transferred on the link even if there is a possibility that the data will be intercepted. - It uses password authentication to verify the receiver’s identity. • - decrypting a message is done only using secret key. Disadvantages of symmetric crypto system: - Cannot provide digital signatures that cannot be repudiated. Design flaws: flaws that exist during the design of software, during the development of the software . Implementation flaws: flaws that exist when a software is being implemented as part of testing procedures and processes before the software is being deployed. The first encryption technique flaw is design flaws as the encryption is related to the software of the system. the second buffer overflow is implementation flaw as it deals with Inappropriate checking/sanitation of user input. 3 main entities are bot master, command and control and bot.

Meer zien Lees minder
Instelling
ICT 2024
Vak
ICT 2024









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ICT 2024
Vak
ICT 2024

Documentinformatie

Geüpload op
8 februari 2024
Aantal pagina's
14
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
CCRNURSE Walden University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
229
Lid sinds
5 jaar
Aantal volgers
205
Documenten
1337
Laatst verkocht
11 maanden geleden
BEST HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ or EXAM WITH GUARANTEE OF A.

Im an expert on major courses especially; psychology,Nursing, Human resource Management.Assisting students with quality work is my first priority. I ensure scholarly standards in my documents . I assure a GOOD GRADE if you will use my work.

4.3

34 beoordelingen

5
21
4
6
3
4
2
1
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen