to win a prize in a competition to pass a job interview test to answer a test question |
Passive reconnaissance Passive scanning Active grouping |
should only be installed after they are tested must all be installed as soon as possible are never issued for Linux-based systems |
installing hotfixes before service packs using the same basic mode and privileged level passwords using different basic mode and privileged level passwords |
TACACS+ AES DES |
advanced digital certificates UDP/TCP public general law certificates |
OSPF EIGRP IS-IS |
a standards creation body for VPNs obsolete at this time only used for e-commerce sites |
WPA2-PSK WPA-PSK Enterprise Server |
Hunt On Station Ethernet |
1. economic motivation - Hackers generally hack the system to gain confidential information which they can sell or can get some money from. Rest of the things comes under ethical hacking.
2. Active reconnaissance: - Data obtained from DNS is done by Passive reconnaissance and then is used to launch Active reconnaissance.
3. must all be installed as soon as possible: - Because most updates include solving vulnerabilities of system, which needs to be installed as soon as possible.
4. using different basic mode and privileged level passwords: - Cisco applies various authentication levels and guidlines for network security managerment.
5. TACACS+ - RADIUS is used basically for applying additional layer of security.
6. advanced digital certificates : - Digital signature is kind of a public key certificate which is used basically to authenticate the sender of a message using public key infrastructure or PKI
7. OSPF: - OSPF is a protocol having authentication key mechanism that can be used to build authentic rounting tables..
8. a public key algorithm - Diffie-Hellman or DH algorithm is primarily based on public key mechanism passed over public channel . It creates a key which is used to implement symmetric key ciphers.
9. WPA-PSK: - PSK here means pre shared key.
10. Hunt - Hunt is the tool that can intrude in a TCP/IP network and find out vulnerabilities in it. Dsniff is used to snif or find the vulnerabitities by network auditing.
1. (TCO A) A common motivation for a hacker is _____. (Points : 5) economic motivation...
Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...
Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...
1. (TCO 7) Which of the following statements are true? (Points : 5) Interfaces contain one and only one implemented method, a constructor. Interfaces are defined inside an abstract class. All methods defined in an interface must be implemented when used by another class. A true object-oriented design must contain as least one interface. Question 2. 2. (TCO 7) In an object-oriented program, methods with no implementation might be found in an _____ and/or a(n) ______....
QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...
1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....
What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...
summatize the following info and break them into differeng key points. write them in yojr own words apartus 6.1 Introduction—The design of a successful hot box appa- ratus is influenced by many factors. Before beginning the design of an apparatus meeting this standard, the designer shall review the discussion on the limitations and accuracy, Section 13, discussions of the energy flows in a hot box, Annex A2, the metering box wall loss flow, Annex A3, and flanking loss, Annex...