100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEC-250 Questions and answers latest update

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
22-05-2024
Written in
2023/2024

SEC-250 Questions and answers latest update What does it mean to say that a Certificate Authority "signs" another party's digital certificate? When a certificate authority signs another party's digital certificate, they are saying that they trust that party, therefore creating a web of trust. The CA performs a mathematical function involving their private key to generate a public key for the applicant What is the purpose of a Certificate Authority? The purpose of a Certificate Authority is to provide certificates and sign off on other certificates creating a web of trust. An example of a certificate authority is Go Daddy. What is the purpose of using TLS/SSL The purpose of TLS/SSL is to ensure that the website you are on is secure and that any information you give to that site will be secure when being transmitted. Define an Advanced Persistent Threat. An Advanced Persistent Threat is a threat from a group of people, like the government who can persistently have a reason to threaten another group of people or person. How does one typically transport data between an air gap network and another network? An air gap network is a network that is physically separated from all other networks. Any data that is transported to an air gap network from another network has to be carefully examined before it can enter. What is the difference between a virus and a worm? A virus requires some sort of user interaction whereas a worm can self replicate and doesn't require user interaction. Describe the behavior/purpose of a trojan and a rootkit A Trojan is a backdoor that is normally part of a larger attack and is done through remote access. A root kit hides malware and a file integrity check can be used to combat root kits. How does "fuzzing" during the development process help create more secure web applications? Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program. If vulnerabilities are discovered before a program is released, developers can prevent their software from being exploited in the wild. Why do web servers present an increased level of exposure? By design web servers are always on, are always connected to the internet, must always have adequate available resources to serve clients, and must accept connections from any (unknown) client. This makes them a common target. In regard to Web Server security, what is a Honey Pot? A Honey Pot is a website that has information and is purposefully insecure in hopes that someone who has a new virus will use the virus on this website. That way, we can learn more about the virus before it attacks an actual website with real information. Why would an organization use an application-level filter to inspect all outgoing mail as well as incoming? An organization might want to look for incoming spam phishing attempts, scan incoming mail for viruses, or monitor outgoing mail to detect an infected mail server. Describe the difference between a stateless and a stateful packet filter: A stateless packet filter looks at incoming and outgoing packets and accepts or denies packets based on criteria like source and destination IP address, Protocol, or Port number. It does not compare packets to any previous packets that have traversed the firewall. A stateful packet filter can monitor a session between an internal host and an external server. It can allow response packets from external servers based on an pre-established session. What is a Cross Site Scripting attack? XSS attacks web Bad code. If the text inputted by the user is reflected back and has not been data validated (or sanitized) the browser will interpret the inputted script as part of the mark up and execute the code accordingly. An XSS attack consists

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
May 22, 2024
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEC-250 Questions and answers latest
update
What does it mean to say that a Certificate Authority "signs" another party's digital certificate?
When a certificate authority signs another party's digital certificate, they are saying that they trust
that party, therefore creating a web of trust. The CA performs a mathematical function involving their
private key to generate a public key for the applicant


What is the purpose of a Certificate Authority?
The purpose of a Certificate Authority is to provide certificates and sign off on other certificates
creating a web of trust. An example of a certificate authority is Go Daddy.


What is the purpose of using TLS/SSL
The purpose of TLS/SSL is to ensure that the website you are on is secure and that any information
you give to that site will be secure when being transmitted.


Define an Advanced Persistent Threat.
An Advanced Persistent Threat is a threat from a group of people, like the government who can
persistently have a reason to threaten another group of people or person.


How does one typically transport data between an air gap network and another network?
An air gap network is a network that is physically separated from all other networks. Any data that is
transported to an air gap network from another network has to be carefully examined before it can
enter.


What is the difference between a virus and a worm?
A virus requires some sort of user interaction whereas a worm can self replicate and doesn't require
user interaction.


Describe the behavior/purpose of a trojan and a rootkit
A Trojan is a backdoor that is normally part of a larger attack and is done through remote access. A
root kit hides malware and a file integrity check can be used to combat root kits.


How does "fuzzing" during the development process help create more secure web applications?
Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that
involves providing invalid, unexpected, or random data to the inputs of a computer program. If
vulnerabilities are discovered before a program is released, developers can prevent their software
from being exploited in the wild.


Why do web servers present an increased level of exposure?
By design web servers are always on, are always connected to the internet, must always have
adequate available resources to serve clients, and must accept connections from any (unknown)
client. This makes them a common target.


In regard to Web Server security, what is a Honey Pot?
A Honey Pot is a website that has information and is purposefully insecure in hopes that someone
who has a new virus will use the virus on this website. That way, we can learn more about the virus
before it attacks an actual website with real information.

, Why would an organization use an application-level filter to inspect all outgoing mail as well as
incoming?
An organization might want to look for incoming spam phishing attempts, scan incoming mail for
viruses, or monitor outgoing mail to detect an infected mail server.


Describe the difference between a stateless and a stateful packet filter:
A stateless packet filter looks at incoming and outgoing packets and accepts or denies packets based
on criteria like source and destination IP address, Protocol, or Port number. It does not compare
packets to any previous packets that have traversed the firewall. A stateful packet filter can monitor a
session between an internal host and an external server. It can allow response packets from external
servers based on an pre-established session.


What is a Cross Site Scripting attack?
XSS attacks web Bad code. If the text inputted by the user is reflected back and has not been data
validated (or sanitized) the browser will interpret the inputted script as part of the mark up and
execute the code accordingly. An XSS attack consists of an attacker taking advantage of this.


Describe a SQL injection attack
An SQL injection attack is when a hacker tries to get information from a database by using a web
form. You can run SQL commands to get certain information.


Commonly a hacker's goal is to reach the point where they can execute 'arbitrary code' on a remote
system. What exactly does 'arbitrary code' mean?
'Arbitrary code' refers to an attacker's ability to run any command they choose. This implies that they
have root or administrator level access.


What does non-repudiation mean? How are digital signatures used in repudiation disputes?
Non-repudiation is 'an authentication that can be asserted to be genuine with high assurance',
meaning we can believe beyond a reasonable doubt that an individual did something and they are
unable to deny it. By digitally signing a document, others can use our public key to verify beyond a
reasonable doubt that we created the document.


What is a logic bomb?
A logic bomb is any code that is set to execute when a certain condition or event transpires in the
future. They are often employed by criminals to hide their tracks in the case that they're caught.


How does a DNS amplification attack work?
An attacker sends a small request to a public DNS server soliciting a large amount of data in response.
The attacker supplies a sources address of its victim so that the size-amplified reply packets are sent
to the victim, possibly creating a Denial of Service condition.


Describe AAA
Authentication is how you identity yourself with something you know(a password), something you
have(a key card or smart card) or something you are(your fingerprint or retina).
Authorization is making sure that only the people that need to have and see certain information are
authorized to do so whereas people who shouldn't have access to it, can't.
Accounting is keeping of logs and records of things like smart card swipes.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
1 year
Number of followers
10
Documents
4101
Last sold
2 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions