100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SEC-250 Questions and answers latest update

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
22-05-2024
Geschreven in
2023/2024

SEC-250 Questions and answers latest update What does it mean to say that a Certificate Authority "signs" another party's digital certificate? When a certificate authority signs another party's digital certificate, they are saying that they trust that party, therefore creating a web of trust. The CA performs a mathematical function involving their private key to generate a public key for the applicant What is the purpose of a Certificate Authority? The purpose of a Certificate Authority is to provide certificates and sign off on other certificates creating a web of trust. An example of a certificate authority is Go Daddy. What is the purpose of using TLS/SSL The purpose of TLS/SSL is to ensure that the website you are on is secure and that any information you give to that site will be secure when being transmitted. Define an Advanced Persistent Threat. An Advanced Persistent Threat is a threat from a group of people, like the government who can persistently have a reason to threaten another group of people or person. How does one typically transport data between an air gap network and another network? An air gap network is a network that is physically separated from all other networks. Any data that is transported to an air gap network from another network has to be carefully examined before it can enter. What is the difference between a virus and a worm? A virus requires some sort of user interaction whereas a worm can self replicate and doesn't require user interaction. Describe the behavior/purpose of a trojan and a rootkit A Trojan is a backdoor that is normally part of a larger attack and is done through remote access. A root kit hides malware and a file integrity check can be used to combat root kits. How does "fuzzing" during the development process help create more secure web applications? Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that involves providing invalid, unexpected, or random data to the inputs of a computer program. If vulnerabilities are discovered before a program is released, developers can prevent their software from being exploited in the wild. Why do web servers present an increased level of exposure? By design web servers are always on, are always connected to the internet, must always have adequate available resources to serve clients, and must accept connections from any (unknown) client. This makes them a common target. In regard to Web Server security, what is a Honey Pot? A Honey Pot is a website that has information and is purposefully insecure in hopes that someone who has a new virus will use the virus on this website. That way, we can learn more about the virus before it attacks an actual website with real information. Why would an organization use an application-level filter to inspect all outgoing mail as well as incoming? An organization might want to look for incoming spam phishing attempts, scan incoming mail for viruses, or monitor outgoing mail to detect an infected mail server. Describe the difference between a stateless and a stateful packet filter: A stateless packet filter looks at incoming and outgoing packets and accepts or denies packets based on criteria like source and destination IP address, Protocol, or Port number. It does not compare packets to any previous packets that have traversed the firewall. A stateful packet filter can monitor a session between an internal host and an external server. It can allow response packets from external servers based on an pre-established session. What is a Cross Site Scripting attack? XSS attacks web Bad code. If the text inputted by the user is reflected back and has not been data validated (or sanitized) the browser will interpret the inputted script as part of the mark up and execute the code accordingly. An XSS attack consists

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
22 mei 2024
Aantal pagina's
7
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SEC-250 Questions and answers latest
update
What does it mean to say that a Certificate Authority "signs" another party's digital certificate?
When a certificate authority signs another party's digital certificate, they are saying that they trust
that party, therefore creating a web of trust. The CA performs a mathematical function involving their
private key to generate a public key for the applicant


What is the purpose of a Certificate Authority?
The purpose of a Certificate Authority is to provide certificates and sign off on other certificates
creating a web of trust. An example of a certificate authority is Go Daddy.


What is the purpose of using TLS/SSL
The purpose of TLS/SSL is to ensure that the website you are on is secure and that any information
you give to that site will be secure when being transmitted.


Define an Advanced Persistent Threat.
An Advanced Persistent Threat is a threat from a group of people, like the government who can
persistently have a reason to threaten another group of people or person.


How does one typically transport data between an air gap network and another network?
An air gap network is a network that is physically separated from all other networks. Any data that is
transported to an air gap network from another network has to be carefully examined before it can
enter.


What is the difference between a virus and a worm?
A virus requires some sort of user interaction whereas a worm can self replicate and doesn't require
user interaction.


Describe the behavior/purpose of a trojan and a rootkit
A Trojan is a backdoor that is normally part of a larger attack and is done through remote access. A
root kit hides malware and a file integrity check can be used to combat root kits.


How does "fuzzing" during the development process help create more secure web applications?
Fuzz testing or fuzzing is a software testing technique, often automated or semi-automated, that
involves providing invalid, unexpected, or random data to the inputs of a computer program. If
vulnerabilities are discovered before a program is released, developers can prevent their software
from being exploited in the wild.


Why do web servers present an increased level of exposure?
By design web servers are always on, are always connected to the internet, must always have
adequate available resources to serve clients, and must accept connections from any (unknown)
client. This makes them a common target.


In regard to Web Server security, what is a Honey Pot?
A Honey Pot is a website that has information and is purposefully insecure in hopes that someone
who has a new virus will use the virus on this website. That way, we can learn more about the virus
before it attacks an actual website with real information.

, Why would an organization use an application-level filter to inspect all outgoing mail as well as
incoming?
An organization might want to look for incoming spam phishing attempts, scan incoming mail for
viruses, or monitor outgoing mail to detect an infected mail server.


Describe the difference between a stateless and a stateful packet filter:
A stateless packet filter looks at incoming and outgoing packets and accepts or denies packets based
on criteria like source and destination IP address, Protocol, or Port number. It does not compare
packets to any previous packets that have traversed the firewall. A stateful packet filter can monitor a
session between an internal host and an external server. It can allow response packets from external
servers based on an pre-established session.


What is a Cross Site Scripting attack?
XSS attacks web Bad code. If the text inputted by the user is reflected back and has not been data
validated (or sanitized) the browser will interpret the inputted script as part of the mark up and
execute the code accordingly. An XSS attack consists of an attacker taking advantage of this.


Describe a SQL injection attack
An SQL injection attack is when a hacker tries to get information from a database by using a web
form. You can run SQL commands to get certain information.


Commonly a hacker's goal is to reach the point where they can execute 'arbitrary code' on a remote
system. What exactly does 'arbitrary code' mean?
'Arbitrary code' refers to an attacker's ability to run any command they choose. This implies that they
have root or administrator level access.


What does non-repudiation mean? How are digital signatures used in repudiation disputes?
Non-repudiation is 'an authentication that can be asserted to be genuine with high assurance',
meaning we can believe beyond a reasonable doubt that an individual did something and they are
unable to deny it. By digitally signing a document, others can use our public key to verify beyond a
reasonable doubt that we created the document.


What is a logic bomb?
A logic bomb is any code that is set to execute when a certain condition or event transpires in the
future. They are often employed by criminals to hide their tracks in the case that they're caught.


How does a DNS amplification attack work?
An attacker sends a small request to a public DNS server soliciting a large amount of data in response.
The attacker supplies a sources address of its victim so that the size-amplified reply packets are sent
to the victim, possibly creating a Denial of Service condition.


Describe AAA
Authentication is how you identity yourself with something you know(a password), something you
have(a key card or smart card) or something you are(your fingerprint or retina).
Authorization is making sure that only the people that need to have and see certain information are
authorized to do so whereas people who shouldn't have access to it, can't.
Accounting is keeping of logs and records of things like smart card swipes.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LectAziim Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
13
Documenten
4143
Laatst verkocht
3 maanden geleden
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen