Question

Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...

Subject: Principles of Information Security

True/False

  1. TLS is dead and SSL is the path forward.
  2. A signed applet can be hijacked.
  3. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project.
  4. The generation of a real random number is a trivial task.
  5. Buffer overflow is one of the most common web attack methodologies.
  6. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM), on a computer system.

Multiple Choice

7. Which cryptographic protocols can be used by SSL/TLS?

A. HTTPS and SSMTP

B. Diffie-Hellman and RSA

C. RC4 and 3DES

D. MD5 and SHA-1

8. Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers?

A. SSMTP

B. HTTP

C. SPOP3

D. HSTS

9. Which port does HTTP traffic travel over by default?

A. TCP port 8080

B. TCP port 80

C. UDP port 8080

D. UDP port 80

10. Which term refers to the process by which application programs manipulate strings to a base form, creating a foundational representation of the input?

A. Canonicalization

B. Obfuscation

C. Injection

D. Blacklisting

11. A(n) __________ outlines the proper settings and configurations for an application or set of applications.

A. application configuration baseline

B. memory management report

C. locally shared object

D. deprecated function

12. Which type of testing involves running the system under a controlled speed environment?

A. Fuzz testing

B. Penetration testing

C. Stress testing

D. Load testing

13. Which term refers to the process of checking whether the program specification captures the requirements from the customer?

A. Data exposure

B. Static analysis

C. Verification

D. Validation

0 0
Add a comment Improve this question Transcribed image text
Answer #1

7 .  A. HTTPS and SSMTP

8   B. HTTP

9. B. TCP port 80

10. A. Canonicalization

11. A. application configuration baseline

12. D. Load testing

13. D. Validation

Add a comment
Know the answer?
Add Answer to:
Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Which of the following statements are true? (2) a. SSL was derived from TLS. b. HTTP...

    Which of the following statements are true? (2) a. SSL was derived from TLS. b. HTTP is less expensive than HTTPS. c. HTTPS and HTTP operate on the same default port. d. HTTP uses SSL, while HTTPS uses TLS.

  • Which port uses TLS to secure web traffic? a. TCP 443 b. UDP 553 c. UDP...

    Which port uses TLS to secure web traffic? a. TCP 443 b. UDP 553 c. UDP 443 d. TCP 1080

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID...

    Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50...

    Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50 Please send me the correct answer The last page have 43,45,49,50 We were unable to transcribe this imageprotocol (32) t an application attempts to send a UDP do? message that exceeds the Maximum Transmission Unit (MTU), what will the Ip d) compress it le) expand MTU (b) truncate it (c) fragment n (a) reject it (33] Which is not true of the Transmission Controil...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT