100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SRA 111 Exam 3 study guide || All Questions Answered Correctly. $11.69   Add to cart

Exam (elaborations)

SRA 111 Exam 3 study guide || All Questions Answered Correctly.

 2 views  0 purchase
  • Course
  • SRA 111
  • Institution
  • SRA 111

Once an intruder gains access to a system or a network, what possible damages can be done: correct answers a. Guessing and cracking passwords b. Copying a database containing credit cards #s c. Viewing sensitive data such as payroll information or medical information without authorization d. Run...

[Show more]

Preview 2 out of 12  pages

  • October 3, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SRA 111
  • SRA 111
avatar-seller
FullyFocus
SRA 111 Exam 3 study guide || All Questions Answered
Correctly.
Once an intruder gains access to a system or a network, what possible damages can be done:
correct answers a. Guessing and cracking passwords
b. Copying a database containing credit cards #s
c. Viewing sensitive data such as payroll information or medical information without
authorization
d. Running a packet sniffer software to capture all username and passwords
e. Defacing a webserver (i.e., changing the visual appearance of the web page)

When implements as a part of Incident Response System, what role intrusion prevention system
play correct answers It can be considered as the 1st layer of defense against the intruders
(a) IPS consists of information security policies and procedures and programs that are
implemented to block an intruder to gain access to the system.
(b) For example, implementing appropriate security technologies such as Firewall or VPN to
minimize the possibility of intrusion

When implements as a part of Incident Response System, Intrusion Detection system (IDS)
performs the following three things: correct answers If intrusion prevention fails, the intruder has
to deal with the Intrusion Detection System that performs the following three things.
(a) Identify that the intrusion has occurred (i.e., Security Incident Identification)
(b) Classify that what type of intrusion is that
(c) Report this security incident to the network administration so that appropriate sec measures
can be taken as a response to that.

Intrusion ___________ system only monitors network traffic and reports security incidents or
intrusions to network administrator. correct answers Detection

Intrusion ___________ system not only monitors network traffic but may have the capability to
take immediate action to stop the intrusion correct answers Prevention

__________is a type of attack on information assets in which an Intruder try to gain access to a
network or a system or system resources to perform unauthorized activities correct answers
Intrusion

_______________ is an individual who is not authorized to use the computer and who somehow
penetrates the network or System's Access Control to exploit a legitimate user account correct
answers Masquerader

_______________ is an authorized user who tries to access data, programs, or resources for
which he/she is not authorized or may be authorized to access such resources but misuse his/her
privileges correct answers Misfeasor

, _______________ is a user who somehow gains administrative controls and tries to act as a
supervisor and uses his/her administrative privileges to evade security auditing and access
controls mechanisms correct answers Clandestine user

Masquerader is an individual who is likely to be an ______________ to the private network
correct answers Outsider

Misfeasor is an individual who is likely to be a ______________ to the private network correct
answers Insider

Clandestine user is an individual who is likely to be a ______________ to the private network
correct answers outsider and insider

_____________ can be considered as the 1st layer of defense against the intruders in incident
response system correct answers Intrusion prevention

_______________ specifies which security measures must be taken to deal with the security
incident to minimize the loss and maximize the possibility of getting back to the normal state of
operation correct answers Intrusion reaction

_______________ finalizes the restoration process and documents all the relevant information
about the security incident to ensure that the same intrusion cannot be occurred in the future
correct answers Intrusion correction

____________ can be considered as the 2nd layer of defense against the intruders correct
answers Intrusion detection

_________________ activates once the intrusion is detected and reported to the network
administrator correct answers Intrusion reaction

_______________________ transfers the control back to the Intrusion Prevention System once
the intrusion has resolved correct answers Intrusion correction

1. The cryptographic algorithms can be classified into _________________ algorithms and
________________ algorithms. correct answers Symmetric, Asymmetric

Symmetric key algorithm requires that both sender and receiver must share _____ correct
answers Secret key

Asymmetric key algorithm uses __________ key (s) to perform encryption and decryption.
correct answers two

A symmetric key encryption algorithm takes _______ and _________ as an input to produce
cipher-text correct answers Plaintext and secret key

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.69. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76800 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.69
  • (0)
  Add to cart