WGU C702 Forensics and Network Intrusion Knowledge Check with complete solutions |Latest 2024/2025
8 views 0 purchase
Course
WGU C702
Institution
WGU C702
Information Security [IT Security] Securing information protects information and information systems from illegal access, use, modification, or destruction. It ensures confidentiality, integrity, and availability of data.
Network-Based intrusion detection: A network-based ID system monitors ...
Knowledge Check with complete solutions. i- i- i- i- i-
Information Security [IT Security] Securing information protects
i- i- i- i-i- i- i- i- i-
information and information systems from illegal access, use,
i- i- i- i- i- i- i- i-
modification, or destruction. It ensures confidentiality, integrity, and
i- i- i- i- i- i- i- i-
availability of data. i- i-
Network-Based intrusion detection: A network-based ID system i- i- i-i- i- i- i- i- i-
monitors the traffic on its network segment as a data source
i- i- i- i- i- i- i- i- i- i-
DNS Redirection:
i- DNS redirection is the controversial practice of i-i- i- i- i- i- i- i- i- i-
serving a Web page to a user that is different from either the one
i- i- i- i- i- i- i- i- i- i- i- i- i- i-
requested or one that might reasonably be expected, such as an error
i- i- i- i- i- i- i- i- i- i- i- i-
page
Router Cache: i- The database of addresses and forwarding i-i- i- i- i- i- i- i- i-
information of network traffic stored in a router. It can also provide
i- i- i- i- i- i- i- i- i- i- i- i-
information about attacks i- i-
Session Poisoning: i- is a method to exploit insufficient input validation i-i- i- i- i- i- i- i- i- i- i-
within a server application. Typically a server application that is
i- i- i- i- i- i- i- i- i- i-
vulnerable to this type of exploit will copy user input into session
i- i- i- i- i- i- i- i- i- i- i- i-
variables
,Configuration management The process of keeping track of all i- i-i- i- i- i- i- i- i- i- i-
changes made to hardware, software, and firmware throughout the life
i- i- i- i- i- i- i- i- i- i-
of a system; source code management and revision control are part of
i- i- i- i- i- i- i- i- i- i- i- i-
this
Hash Injection Attack:
i- It's when the attacker injects a compromised i- i-i- i- i- i- i- i- i- i- i-
hash into a local session and use that same hash to validate the network
i- i- i- i- i- i- i- i- i- i- i- i- i- i-
resources of that particular network i- i- i- i-
Network Security [IT Security] Networks are used to send important
i- i- i- i-i- i- i- i- i- i- i- i-
and private data from one system to another. Networks should be
i- i- i- i- i- i- i- i- i- i- i-
secured for safe transfer of data. Damage to the network makes the data
i- i- i- i- i- i- i- i- i- i- i- i- i-
transfer vulnerable and may crash the system.
i- i- i- i- i- i-
Facilities Security [Physical Security] Facilities and an organization's
i- i- i- i-i- i- i- i- i- i-
equipment should be properly and highly secured. Damage to facilities
i- i- i- i- i- i- i- i- i- i-
can cause physical harm such as a system crash or power failure.
i- i- i- i- i- i- i- i- i- i- i-
Human Security [Physical Security]
i- The employees of an i- i- i-i- i- i- i- i- i-
organization should be given security awareness training and be involved
i- i- i- i- i- i- i- i- i- i-
in the entire business security process in order to gain their trust and
i- i- i- i- i- i- i- i- i- i- i- i- i-
acceptance of the security policy. Ignoring human security concerns can
i- i- i- i- i- i- i- i- i- i-
cause employees to leave, leading to loss of business.
i- i- i- i- i- i- i- i-
Financial Security i- i-i- i- Consists of: i-
i- Security from frauds; i- i-
, i- Phishing attacks; i-
i- Botnets;
i- Threats from cyber criminals;
i- i- i-
i- Credit card fraud;
i- i-
Security from fraud [Financial Security]
i- To function properly and
i- i- i- i-i- i- i- i- i- i-
negate losses, an organization must be financially secure from both
i- i- i- i- i- i- i- i- i- i-
internal and external threats. Security breaches may be caused by data
i- i- i- i- i- i- i- i- i- i- i-
manipulations, system vulnerabilities and threats, or data theft. i- i- i- i- i- i- i-
Physical Security i- i-i- i- Consists of: i- i-
Facilities security: i-
Human security: i-
Border security; i-
Biometric security; i-
Legal Security
i- i-i- Consists of:
i- i-
National security; i-
Public security;
i- i-
Defamation;
Copyright information; i-
Sexual harassment;
i-
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller AcademiaExpert. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.