100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ICT EXAM QUESTIONS & ANSWERS 2024 UPDATE | 100% CORRECT

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
08-02-2024
Written in
2023/2024

ICT EXAM QUESTIONS & ANSWERS 2024 UPDATE | 100% CORRECT Select one: a. Install endpoint protection software on the client machine b. Implement bounds checking on the input string c. Compile the program with stack canaries d. Prevent the user from specifying the length of the input string e. Enable address space layout randomisation Question text Which of the following doesn’t attach to a file but can replicate itself? Select one: a. Virus b. Buffer overflow c. Trojan d. Worm Select one: a. Using a type-safe language. b. Using a firewall. c. Using encryption. d. Using passwords to authenticate users. Question text People exaggerate risks that are: Select one: a. Non-existent b. Well understood c. Unfamiliar d. Common Question text Which of the following is a limitation of dictionary attacks? Select one: a. Ineffective against complex passwords b. Requires the password to be stored as plaintext c. Must wait for password to be transmitted d. Relies on lack of input validation in login field e. Ineffective against salted passwords Brute force attack Question 8. A network admin has noticed a high level of TCP traffic in and out of the network. After investigating the traffic with Wireshark, he discovered malformed TCP ACK packets with unauthorized data. What has he discovered? Select one: a. TCP port scanning b. Buffer overflow c. DoS attack d. Covert channel Two commonly used methods for request and response between client and server are: GET and POST • GET method -Client ends HTTP Requests data from specified resource to server. • POST - Server submits data to be processed to client specified resource. HTTP Common Request Methods The Attacker can attack by modifying ‘acct’ parameter in their browser to send whatever account number they want. In the java code below, String query = "SELECT * FROM accts WHERE account = ?"; PreparedStatement pstmt = reStatement(query, … ); String(1, Parameter("acct")); ResultSet results = teQuery(); If not verified, attacker can access any user’s account 1. it is a 2 factor authentication. 2, yes it is 2 factor authentication because it uses pin and key fob to authenticate. And both pin and key fobs must be valid in order to work. 3. It can be further strengthen by using biometric recognition technology as the fingerprint can only be found on the individual user itself. Finger print is unique for every person and cannot be replicated. Not yet answered Cannot provide digital signatures that cannot be repudiated In an asymmetric cryptography system, there are two different keys used for the encryption and decryption of data. The key used for encryption is kept public and so as called public key, and the decryption key is kept secret and called private key. The sender and the receiver have two keys in an asymmetric system. However, the private key is kept private and not sent over with the message to the receiver, although the public key is. A symmetric cryptography system, has only one key for both encryption and decryption. The key used for encryption and decryption is called the private key and only people who are authorized for the encryption/decryption would know it. In a symmetric cryptography system, the encrypted message is sent over without any public keys attached to it. ADVANTAGES of symmetric crypto system - Encryption is faster. - Encrypted data can be transferred on the link even if there is a possibility that the data will be intercepted. - It uses password authentication to verify the receiver’s identity. • - decrypting a message is done only using secret key. Disadvantages of symmetric crypto system: - Cannot provide digital signatures that cannot be repudiated. Design flaws: flaws that exist during the design of software, during the development of the software . Implementation flaws: flaws that exist when a software is being implemented as part of testing procedures and processes before the software is being deployed. The first encryption technique flaw is design flaws as the encryption is related to the software of the system. the second buffer overflow is implementation flaw as it deals with Inappropriate checking/sanitation of user input. 3 main entities are bot master, command and control and bot. Not yet answered Cannot provide digital signatures that cannot be repudiated In an asymmetric cryptography system, there are two different keys used for the encryption and decryption of data. The key used for encryption is kept public and so as called public key, and the decryption key is kept secret and called private key. The sender and the receiver have two keys in an asymmetric system. However, the private key is kept private and not sent over with the message to the receiver, although the public key is. A symmetric cryptography system, has only one key for both encryption and decryption. The key used for encryption and decryption is called the private key and only people who are authorized for the encryption/decryption would know it. In a symmetric cryptography system, the encrypted message is sent over without any public keys attached to it. ADVANTAGES of symmetric crypto system - Encryption is faster. - Encrypted data can be transferred on the link even if there is a possibility that the data will be intercepted. - It uses password authentication to verify the receiver’s identity. • - decrypting a message is done only using secret key. Disadvantages of symmetric crypto system: - Cannot provide digital signatures that cannot be repudiated. Design flaws: flaws that exist during the design of software, during the development of the software . Implementation flaws: flaws that exist when a software is being implemented as part of testing procedures and processes before the software is being deployed. The first encryption technique flaw is design flaws as the encryption is related to the software of the system. the second buffer overflow is implementation flaw as it deals with Inappropriate checking/sanitation of user input. 3 main entities are bot master, command and control and bot.

Show more Read less
Institution
ICT 2024
Course
ICT 2024









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ICT 2024
Course
ICT 2024

Document information

Uploaded on
February 8, 2024
Number of pages
14
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CCRNURSE Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
229
Member since
5 year
Number of followers
205
Documents
1337
Last sold
11 months ago
BEST HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ or EXAM WITH GUARANTEE OF A.

Im an expert on major courses especially; psychology,Nursing, Human resource Management.Assisting students with quality work is my first priority. I ensure scholarly standards in my documents . I assure a GOOD GRADE if you will use my work.

4.3

34 reviews

5
21
4
6
3
4
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions