Monday, 23 June 2014

Sec 370 web security

1. (TCO 5) What is a weakness of symmetric encryption? (Points : 5)       Modern math processors can break it quickly.
It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
Since the key must be transmitted, the scheme is only as secure as your transport method.
Throughput is minimal, making it a poor choice for large files.
Symmetric key encryption has no weaknesses.
Question 2. 2. (TCO 5) Which is an asymmetric key encryption system? (Points : 5)
SSL
DES
PGP
Question 3. 3. (TCO 6) A good definition of VPNs is they are a combination of authentication, access control, _____ (Points : 5)
tunneling, and dial up
tunneling, and encryption
leased lines, ISP, and piggy backing
Internet direct access, and dial up

Question 4. 4. (TCO 6) IPSEC supports which two types of modes? Tunnel and: (Points : 5)
Transport
Bridge
Insecure
non IP

Question 5. 5. (TCO 4) What profiling types are used in anomaly detection? (Points : 5)
Deflection and deterrence
Resource and user/group work
Infiltration and preemptive blocking
Snort and Cisco intrusion detection

Question 6. 6. (TCO 8) What Windows account types are most attractive to attackers?(Points : 5)
Administrators, IUSR_Machine name
Guests, backdoors
Apache, sysadam
DC security, HIsecdc

Question 7. 7. (TCO 8) The most powerful account to have in a Linux system is: (Points : 5)
Admin
Null
Root
Apache


No comments:

Post a Comment