100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SEC Question and answers already passed

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
13-11-2024
Written in
2024/2025

SEC Question and answers already passed SEC + BOLC Final Which IPSEC protocol provides confidentiality and integrity? - correct answer ESP Which of these protocols uses x.509 certificates? - correct answer S/MIME Where are bastion hosts placed? - correct answer DMZ Which level of the OSI model is concerned with MAC addresses? - correct answer Data Link Using zero compression, what would be the IPV6 address for fe80:0000:0000:0000)0c02:0023:5001:8760 be? - correct answer fe80::c02:23:5001:8760 what is the name of the browser protocol that the client uses to contact the CA directly and ask a

Show more Read less
Institution
SBOLC
Course
SBOLC

Content preview

SEC + BOLC Final
Which IPSEC protocol provides confidentiality and integrity? - correct answer
✔ESP


Which of these protocols uses x.509 certificates? - correct answer ✔S/MIME


Where are bastion hosts placed? - correct answer ✔DMZ


Which level of the OSI model is concerned with MAC addresses? - correct
answer ✔Data Link


Using zero compression, what would be the IPV6 address for
fe80:0000:0000:0000)0c02:0023:5001:8760 be? - correct answer
✔fe80::c02:23:5001:8760


what is the name of the browser protocol that the client uses to contact the CA
directly and ask about the revocations status of a particular certificate? -
correct answer ✔CRL


Which one of these is not a hashing algorithm? - correct answer ✔ECC


Which of these algorithms is an asymmetric algorithm that is only used for key
exchange/key agreement? - correct answer ✔Diffie Helmen


Which of these symmetric algorithms was not a finalist for the advance
encryption standard? - correct answer ✔Blowfish

, you have a cipher text of 100011001 and a key string of 10101010 what would
your plain text be using XOR? - correct answer ✔00110011


Which of these block cipher modes is designed to operate like a stream
cipher? - correct answer ✔Cipher feedback


Obviously encrypted messages can draw unwanted attention. what is one way
to present an encrypted message without showcasing its existence? - correct
answer ✔Stenography


XML queries used an xml injection attack are different from sql queries but the
principles and exploits are similar. True or False? - correct answer ✔True


A secure web application will both sanitize and validate input which in term will
help protect it against ? - correct answer ✔SQL injection, Cross Site
Scripting, Cross Site Request Forgeries, All of the above


Another name for race condition is? - correct answer ✔Time of check to time
of use


Which of these application exploits is an effective denial of service attack? -
correct answer ✔Resource exhaustion


Bluejacking is an attack against ? - correct answer ✔blue tooth device


Which of the following wireless security protocols utilizes the RC4 streaming
encryption algorithm and has serious vulnerabilities in its initialization vector
setup process? - correct answer ✔WEP

Written for

Institution
SBOLC
Course
SBOLC

Document information

Uploaded on
November 13, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • sec

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Academia199 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
356
Member since
3 year
Number of followers
209
Documents
19269
Last sold
1 week ago

3.9

51 reviews

5
27
4
7
3
7
2
3
1
7

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions