Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer all of the following questions: 16.1 Several users have received a

ID: 3696661 • Letter: P

Question

Please answer all of the following questions:

16.1 Several users have received an email that says it is from the company’s benefits provider. Users are asked to click a link in the email and provide their personal information so that they can access a new benefits management web site. Upon investigation, you discover that your company’s benefits provider did not send the email. What kind of attack is this?

            a. man in the middle b. phishing     c. denial of service    d. war driving

16.2 Which statements about worms and viruses are true? (Choose two.)

            a. Worms can independently replicate themselves on different hosts

            b. Viruses can independently replicate themselves on different hosts

            c. Worms require user action, such as opening a file, to replicate

            d. Viruses secretly attach themselves to a document or program

16.3 An IT staffer employed by your organization wrote a database application several years ago to manage employee time-off requests. He was recently terminated by the company. When that happened, a latent virus that he had hidden within his application executed and destroyed all of the data in the employee time-off database. What kind of malware is this?

            a. Keylogger              b. Logic bomb           c. Trojan                    d. Spyware

16.4 You are helping a small startup business design its network. The business’s main server will host a mission-critical database application that will store sensitive information. The business will also host a web server for customers. Where should the web server be placed?

                        a. On the internal network behind a firewall

                        b. On the internal network behind a NAT router

                        c. In the demilitarized zone (DMZ)

                       

16.5 This type of malware pretends to do one thing while doing something evil.

            a. rootkit                    b. macro                     c. worm                      d. Trojan

16.6 This type of program hides the presence of malware.

            a. spyware                  b. virus                       c. adware                    d. rootkit

16.7 What type of attack uses zombie computers to bring a network down under a massive number of requests?

a. DDOS                     b. phishing     c. social engineering d. man in the middle

16.8 Which type of attack involves the attacker inserting himself into a conversation between two others?

            a. phishing     b. man in the middle             c. malware                  d. leeching

Describe one way to provide protection against physical intrusion.

Describe one way to provide protection against hardware failures.

A password is an authentication method based on what a user knows. Another way to authenticate, called biometrics, is based on who the user is.

List two kinds of biometrics.

What is one disadvantage of biometric authentication?

Your boss has asked you to set up a new network for your office. There are currently 10 employees. The network should include wired Ethernet connections to each work area, a wireless network, and a web server.

List the requirements, including: the number of workstations and servers, required peripherals, contents of the telecommunications room, and security features.

  

Sketch a logical design showing the internet connection, the gateway router, a switch, an access point, peripherals, and a few hosts.

Specify the switch, including the number of ports, the network speed, and any other necessary features, such as VLAN support.

Specify the AP, including the version of 802.11 used and the encryption used.

Specify how your design will meet the security requirements in (a) above.

Explanation / Answer

Question and Answers

16.8 Which type of attack involves the attacker inserting himself into a conversation

between two others?

            a. phishing     b. man in the middle             c. malware                  d. leeching

Answer (b) man in the middle.

16.5 This type of malware pretends to do one thing while doing something evil.

            a. rootkit                    b. macro                     c. worm                      d. Trojan

Answer (d) Trojan

16.6 This type of program hides the presence of malware.

            a. spyware                  b. virus                       c. adware                    d. rootkit

Answer (d) rootkit

16.7 What type of attack uses zombie computers to bring a network down under a massive number of requests?

a. DDOS                     b. phishing     c. social engineering d. man in the middle

Answer (a) DDOS

16.2 Which statements about worms and viruses are true? (Choose two.)

            a. Worms can independently replicate themselves on different hosts

            b. Viruses can independently replicate themselves on different hosts

            c. Worms require user action, such as opening a file, to replicate

            d. Viruses secretly attach themselves to a document or program

Answer (a) (c)

            a. Worms can independently replicate themselves on different hosts

            c. Worms require user action, such as opening a file, to replicate

16.1 Several users have received an email that says it is from the company’s benefits provider. Users are asked to click a link in the email and provide their personal information

so that they can access a new benefits management web site. Upon investigation, you

discover that your company’s benefits provider did not send the email. What kind of attack

is this?

            a. man in the middle b. phishing     c. denial of service    d. war driving

Answer (b) phising

16.3 An IT staffer employed by your organization wrote a database application several

years ago to manage employee time-off requests. He was recently terminated by the

company. When that happened, a latent virus that he had hidden within his application executed and destroyed all of the data in the employee time-off database. What kind of

malware is this?

            a. Keylogger              b. Logic bomb           c. Trojan                    d. Spyware

Answer (d) Spyware

16.4 You are helping a small startup business design its network. The business’s main server

will host a mission-critical database application that will store sensitive information. The

business will also host a web server for customers. Where should the web server be

placed?

                        a. On the internal network behind a firewall

                        b. On the internal network behind a NAT router

                        c. In the demilitarized zone (DMZ)

Answer (b)   On the internal network behind a NAT router

List two kinds of biometrics.

            DNA Marching

            EAR

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote