Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Advances in technology occur too rapidly for security pros to keep up with them.

ID: 3851445 • Letter: A

Question

       Advances in technology occur too rapidly for security pros to keep up with them.
       Improvements in technology actually create the most security problems.
       Technology cannot be effective if people do not follow appropriate procedures.
       The author actually does say that technology solves network security problems.

       HIsecdc, Hisecws, Websec, IPSec
       DC security Securews, Rootsec, Supersec
       Rootsec, Supersec Websec, IPSec
       DC security, HIsecdc, Hisecws, Securews

       ASP.NET
       Administrator
       IUSR_machine name
       username

       By reading the e-mail address book and mailing itself to everyone listed
       By broadcasting ICMP packets and following network connections
       By accessing the web application and cloning sent mail
       By users downloading and installing unauthorized files from the Web

       To manage popups and prevent nuisance advertising
       To monitor a system, gain access to log on information, and allow access to from the outside
       To monitor a system, gather information, and send it to a home system
       To prevent others from detecting the presence of your computer on the network

       Internet, leased lines, direct access, dial up
       Tunneling, encryption, authentication, access control
       Tunneling, dial up, authentication, Cisco, SNORT
       Encryption, leased lines, ISP, piggy backing

       ESP, IPComp, AH, IKE
       Tunnel, Transport, IETF, MPPE
       IPComp, AH, IETF, MPPE
       AH, ESP, Tunnel, Transport

       Modern math processors can break it quickly.
       It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
       Because the key must be transmitted, the scheme is only as secure as your transport method.
       Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.

       AES
       Blowfish
       IDEA
       PGP

       Deflection and deterrence
       Threshold and resource
       Infiltration and preemptive blocking
       Snort and Cisco intrusion detection

. (TCO 9) Why does the textbook author state that technology alone is not a panacea for network security problems? (Points : 5)

Explanation / Answer

Question: (TCO 9) Why does the textbook author state that technology alone is not a panacea for network security problems? (Points : 5)

Answer:

Advances in technology occur too rapidly for security pros to keep up with them.

Explanation:

Technology is evolving so the ways to breach network easily,so security flaws can be exploited more easily.

Question: (TCO 8) Which of the following security templates are included in Windows servers? (Points : 5)

Answer:

DC security, HIsecdc, Hisecws, Securews

Explanation:

Hisecdc.inf – This is used to increase the security and communications with the domain controllers.

Hisecws.inf – This is used to increase security and communications for the client computers and member servers.

DC security.inf – This is used to configure security of the Registry and File system of a computer that was upgraded from Windows NT to Windows 2000/2003.

Securews.inf – This is used to increase security and communications for the client computers and member servers

Question: (TCO 8) Which of the following would not be a default account on a Windows machine? (Points : 5)

Answer:

ASP.NET

Explanation:

ASP.net is a programing language not any windows user setup criteria.

Question: (TCO 7) Which of the following is the most common method by which viruses spread? (Points : 5)

Answer:

By users downloading and installing unauthorized files from the Web

Explanation:

Internet is filled with virus disguised as file, so downloading it from untrusted site can create a hazard for the PC.

Question: (TCO 7) What is the purpose of spyware? (Points : 5)

Answer:

To monitor a system, gain access to log on information, and allow access to from the outside

Explanation:

spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without their consent, or that asserts control over a device without the consumer's knowledge.

Question: (TCO 6) A good definition of VPNs is that they are a combination of which of the following? (Points : 5)

Answer:

Tunneling, dial up, authentication, Cisco, SNORT

Expalnation:

Tunneling: tunneling enables the encapsulation of a packet from one type of protocol to another protocol.

SNORT: it’s a network intrusion detection system thereby helping to keep vpn secured.

Cisco: network securirty can be implemented by secured cisco protocols.

Dial up: dial up connection can be used to create node to node vpn connection.

VPN solution uses Extensible Authentication Protocol (EAP) to provide secure authentication using both user name and password, and certificate-based methods.

Question: (TCO 6) Which protocols compromise IPSEC? (Points : 5)

Answer:

ESP, IPComp, AH, IKE

Explanation:

Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the packets of data sent over a network.

IKE, Internet Key Exchange.

AH, IP Authentication Header.

ESP, Encapsulating Security Payload.         

IPcomp, Ip payload compression protocol

Question: (TCO 5) which of the following statements is a weakness of symmetric encryption? (Points : 5)

Answer:

Because the key must be transmitted, the scheme is only as secure as your transport method.

Explanation:

The biggest problem with symmetric key encryption is that you need to have a way to get the key to the party with whom you are sharing data. So it depends on how secured your network is. If the network is not secured then the symmetric key can be hacked by someone.

Question: (TCO 5) Which of the following is a widely used public key system that is considered by many experts to be very secure and is available as a plug-in for MSN messenger and other communication software? (Points : 5)

Answer:

Blowfish

Explanation:

It’s the mostly used system as o effective cryptanalysis of it has been found to date, meaning no one is able to break the key to retireve the data.

Question: (TCO 4) What profiling types are used in anomaly detection? (Points : 5)

Answer:

Snort and Cisco intrusion detection

Expalanation:

These systems can be used to detect network anomaly easily.

Hope your question has been resolved. Do not forget to give a positive like to the answer. Thank you.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote