Examination
180 minutes
Instructions:
1. Read each question carefully.
2. Answer all questions.
3. Use the provided answer sheet to mark your responses.
4. Ensure all answers are final before submitting the exam.
5. Please answer each question below and click Submit when you
have completed the Exam.
6. This test has a time limit, The test will save and submit
automatically when the time expires
7. This is Exam which will assess your knowledge on the course
Learning Resources.
Good Luck!
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
Read All Instructions Carefully and Answer All the
Questions Correctly Good Luck: -
ARP poisoning - Answer>> ARP poisoning refers to
flooding the target machine's ARP cache with forged
entries.
What should be covered under a security policy? -
Answer>> Encryption
Access control
Authentication
Firewalls
Antivirus Software
Websites
Gateways
Routers and switches
Packet filtering firewall - Answer>> Packet filtering
firewalls are implemented on the Network Layer and
designed to analyze each packet individually by
applying a set of filters. This firewall type examines the
packet's source, destination, protocol, and destination
port number. If the packet does not comply with the
defined set of rules, then it is dropped and not
forwarded to its destination.
Backup types - Answer>> Full backup - backup is
scheduled and all files are copied
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
,Incremental backup - backups the data that has been
modified since the last backup
Differential backup - performs a backup of the changed
data since the last full backup
Steganography - Answer>> Steganography refers to a
technique which hides a message within another
message. The hidden message is extracted when it
arrives to its destination. This technique is used for
maintaining information confidentiality.
Blind SQL injection - Answer>> Blind SQL injection is an
injection attack in which the attacker is unable to see
the results of the injected queries, so they form queries
to return true or false and based on that determine
whether the application is vulnerable to SQL injection.
They then proceed with injecting true/false queries to
extract the information stored in the database
Firewall types - Answer>> Firewalls are categorized into
two types:
Hardware firewall
Software firewall
Black hat - Answer>> Black hats are hackers who use
their knowledge and skills to discover and exploit
security vulnerabilities for financial gain or malicious
reasons. Their activities can cause major damage to
their targets and their systems. Black hats are usually
involved with criminal activities such as stealing
personal and financial information or shutting down
websites and networks.
Security misconfiguration - Answer>> Security
misconfiguration refers to vulnerabilities that exist in
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
, applications with a poorly configured application stack.
Some of the problems that cause security
misconfiguration vulnerabilities include:
Unvalidated input fields
Form and parameter manipulation
Poor error handling
User behavior analytics (UBA) - Answer>> User behavior
analytics refers to the process of monitoring user
behavior in an attempt to discover potential threats
and attacks. UBA is designed to perform advanced
threat detection in an organization by monitoring
employee behavior and identifying those behaviors that
could lead to potential threats to the organization.
EISA goals - Answer>> Real time monitoring of the
organization's network
Detection and recovery from security breaches
Ensuring cost efficiency of security provisions
Helping the IT department to function properly
Helping in the process of risk assessment of IT assets
Thick whois - Answer>> Thick whois contains all
information from all registrars for the specified set of
data.
Risk levels - Answer>> Extreme/high
Medium
Low
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller YourAssignmentHandlers01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.