SlideShare a Scribd company logo
1 of 3
Download to read offline
Complete the following short answer questions:
1. How do the viruses propagate between computers?
2. What is social engineering?
3. How will an SPI firewall handle a packet containing a TCP segment which is an
acknowledgement?
4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit
access to an FTP server with IP address 10.32.67.112.
5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to
open a connection to an FTP server? Explain.
6. For each of the following passwords, first state the kind of attack that would be necessary to
crack it. Justify your answer. Then say whether or not it is an adequate password, again giving
specific reasons.
a) password
b) Winter1
c) SpringBreaK
d) 2!T*d (00-10)
e) 9g&8tY7#?s+445=232+
Solution
Answers:
1)How do the viruses propagate between computers?
-> The browsers gain more features and functions more methods for virus propagation appear
directly to a computer across the network.
Web pages :
->Either via a download, web code, or a cross-site scripting (CSS) attack, web pages can be a
source of viral infection. As browsers gain more features and functions more methods for virus
propagation appear.
Messages:
-> E-mail messages as well as IM or chat messages can be a vector for viral infection.
-> Whether the virus is spread through links, embedded code, or an attachment depends on the
type of message and the client software.
Infected programs or Trojans :
-> Running an infected program that you copied from a CD or other media (or downloaded) is a
means of infection. Sometimes the virus is a Trojan, where it appears to be a useful program, but
is in fact a virus.
2. What is social engineering?
-> Social engineering is an attack vector that relies heavily on human interaction and often
involves tricking people into breaking normal security procedures.
-> Social engineering is the art of manipulating people so they give up confidential information.
-> A social engineer runs what used to be called a "con game.
Popular types of social engineering attacks :
1)Phishing:
-> Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email,
often purporting to be from a trusted source.
2) Pretexting:
->Pretexting is another form of social engineering where attackers focus on creating a good
pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal
information.
3. How will an SPI firewall handle a packet containing a TCP segment which is an
acknowledgement?
-->Process it through the Access Control List (ACL)
-> Stateful Packet Inspection: Connections have distinct states or stages.
->Different states are subject to different attacks. Stateful firewalls use different filtering rules
for different states. Different because it uses filter rules in order to accept or deny traffic.
->An example would be windows firewall.
4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit access
to an FTP server with IP address 10.32.67.112.?
-> An access control list (ACL) is a table that tells a computer operating system which
accessrights each user has to a particular system object, such as a file directory or individual file.
-> ACLs are a network filter utilized by routers and some switches to permit and restrict data
flows into and out of network interfaces.
-> When an ACL is configured on an interface, the network device analyzes data passing through
the interface.
-> The list has an entry for each system user with access privileges.
-> The most common privileges include the ability to read a file, to write to the file or files, and
to execute the file.
-> Microsoft Windows NT/2000, Novell'sNetWare, Digital's OpenVMS, and UNIX-based
systems are among the operating systems that use access control lists.
-> More advanced lists have more distinct control, but the general guidelines are as follows:
a) A sequence number or term name for each entry.
b)A statement of permission or denial for that entry.
c) the network protocol and associated function or ports.
-> Examples include IP, IPX, ICMP, TCP, UDP, NETBIOS and many others.
5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to
open a connection to an FTP server? Explain.
ACL will apply it's three rules.
1. Allows all connections to port 25.
2. Allow single internal host on port 80.
3. Drops and logs other opening packets.

More Related Content

Similar to Complete the following short answer questions1.  How do the virus.pdf

Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
SCOR-350-701-V6.pdf
SCOR-350-701-V6.pdfSCOR-350-701-V6.pdf
SCOR-350-701-V6.pdfRoysLoudes
 
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...Hamad Al Katheri
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkitsUltraUploader
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerIRJET Journal
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppttashon2
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetationKaveh Khosravi
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 

Similar to Complete the following short answer questions1.  How do the virus.pdf (20)

Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
SCOR-350-701-V6.pdf
SCOR-350-701-V6.pdfSCOR-350-701-V6.pdf
SCOR-350-701-V6.pdf
 
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkits
 
PPT_Compiled
PPT_CompiledPPT_Compiled
PPT_Compiled
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
ThreatModeling.ppt
ThreatModeling.pptThreatModeling.ppt
ThreatModeling.ppt
 
Hacking
HackingHacking
Hacking
 
Firewalls
FirewallsFirewalls
Firewalls
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Is4560
Is4560Is4560
Is4560
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
G011123539
G011123539G011123539
G011123539
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 

More from mohamednihalshahru

Which of the following characteristics of living organisms absolutel.pdf
Which of the following characteristics of living organisms absolutel.pdfWhich of the following characteristics of living organisms absolutel.pdf
Which of the following characteristics of living organisms absolutel.pdfmohamednihalshahru
 
What influence does the presence of alloying elements (other than ca.pdf
What influence does the presence of alloying elements (other than ca.pdfWhat influence does the presence of alloying elements (other than ca.pdf
What influence does the presence of alloying elements (other than ca.pdfmohamednihalshahru
 
Two very long uniformly charged lines (with linear charge densities i.pdf
Two very long uniformly charged lines (with linear charge densities i.pdfTwo very long uniformly charged lines (with linear charge densities i.pdf
Two very long uniformly charged lines (with linear charge densities i.pdfmohamednihalshahru
 
there is a serious outbreak of staph aureus in the hospital. A conve.pdf
there is a serious outbreak of staph aureus in the hospital. A conve.pdfthere is a serious outbreak of staph aureus in the hospital. A conve.pdf
there is a serious outbreak of staph aureus in the hospital. A conve.pdfmohamednihalshahru
 
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdf
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdfTimer Notes obiect and the dashed arrow the image. The rectangle show.pdf
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdfmohamednihalshahru
 
Representatives from four different colleges of UM- Dearborn will be .pdf
Representatives from four different colleges of UM- Dearborn will be .pdfRepresentatives from four different colleges of UM- Dearborn will be .pdf
Representatives from four different colleges of UM- Dearborn will be .pdfmohamednihalshahru
 
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdf
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdfProblem asks me to prove Uniqueness but Im not sure how to do it! .pdf
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdfmohamednihalshahru
 
please send edited codeMain.javapackage part2;import java.util.pdf
please send edited codeMain.javapackage part2;import java.util.pdfplease send edited codeMain.javapackage part2;import java.util.pdf
please send edited codeMain.javapackage part2;import java.util.pdfmohamednihalshahru
 
Inhaling and exhaling Label the figure that shows INHALATION and.pdf
Inhaling and exhaling  Label the figure that shows INHALATION and.pdfInhaling and exhaling  Label the figure that shows INHALATION and.pdf
Inhaling and exhaling Label the figure that shows INHALATION and.pdfmohamednihalshahru
 
In accordance to the PLSS land description system, locate the section.pdf
In accordance to the PLSS land description system, locate the section.pdfIn accordance to the PLSS land description system, locate the section.pdf
In accordance to the PLSS land description system, locate the section.pdfmohamednihalshahru
 
How can a topologically associating domain (TAD) mutation effect mor.pdf
How can a topologically associating domain (TAD) mutation effect mor.pdfHow can a topologically associating domain (TAD) mutation effect mor.pdf
How can a topologically associating domain (TAD) mutation effect mor.pdfmohamednihalshahru
 
Hello, I need help writing a code in C. It wants to do things with f.pdf
Hello, I need help writing a code in C. It wants to do things with f.pdfHello, I need help writing a code in C. It wants to do things with f.pdf
Hello, I need help writing a code in C. It wants to do things with f.pdfmohamednihalshahru
 
Fix the following C program in linux. When it is compiled it gives t.pdf
Fix the following C program in linux. When it is compiled it gives t.pdfFix the following C program in linux. When it is compiled it gives t.pdf
Fix the following C program in linux. When it is compiled it gives t.pdfmohamednihalshahru
 
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdfmohamednihalshahru
 
Examine your opinion on the death penalty. Defend why you are for th.pdf
Examine your opinion on the death penalty. Defend why you are for th.pdfExamine your opinion on the death penalty. Defend why you are for th.pdf
Examine your opinion on the death penalty. Defend why you are for th.pdfmohamednihalshahru
 
Do you think that knowing about aggression between groups of chimpan.pdf
Do you think that knowing about aggression between groups of chimpan.pdfDo you think that knowing about aggression between groups of chimpan.pdf
Do you think that knowing about aggression between groups of chimpan.pdfmohamednihalshahru
 
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdfDiana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdfmohamednihalshahru
 
Create a new java class called ListNode. Implement ListNode as a gen.pdf
Create a new java class called ListNode. Implement ListNode as a gen.pdfCreate a new java class called ListNode. Implement ListNode as a gen.pdf
Create a new java class called ListNode. Implement ListNode as a gen.pdfmohamednihalshahru
 
Briefly describe the two competing theories regarding the origin of H.pdf
Briefly describe the two competing theories regarding the origin of H.pdfBriefly describe the two competing theories regarding the origin of H.pdf
Briefly describe the two competing theories regarding the origin of H.pdfmohamednihalshahru
 
Atlas Advertising Atlas Advertising is a regional advertising agency.pdf
Atlas Advertising Atlas Advertising is a regional advertising agency.pdfAtlas Advertising Atlas Advertising is a regional advertising agency.pdf
Atlas Advertising Atlas Advertising is a regional advertising agency.pdfmohamednihalshahru
 

More from mohamednihalshahru (20)

Which of the following characteristics of living organisms absolutel.pdf
Which of the following characteristics of living organisms absolutel.pdfWhich of the following characteristics of living organisms absolutel.pdf
Which of the following characteristics of living organisms absolutel.pdf
 
What influence does the presence of alloying elements (other than ca.pdf
What influence does the presence of alloying elements (other than ca.pdfWhat influence does the presence of alloying elements (other than ca.pdf
What influence does the presence of alloying elements (other than ca.pdf
 
Two very long uniformly charged lines (with linear charge densities i.pdf
Two very long uniformly charged lines (with linear charge densities i.pdfTwo very long uniformly charged lines (with linear charge densities i.pdf
Two very long uniformly charged lines (with linear charge densities i.pdf
 
there is a serious outbreak of staph aureus in the hospital. A conve.pdf
there is a serious outbreak of staph aureus in the hospital. A conve.pdfthere is a serious outbreak of staph aureus in the hospital. A conve.pdf
there is a serious outbreak of staph aureus in the hospital. A conve.pdf
 
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdf
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdfTimer Notes obiect and the dashed arrow the image. The rectangle show.pdf
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdf
 
Representatives from four different colleges of UM- Dearborn will be .pdf
Representatives from four different colleges of UM- Dearborn will be .pdfRepresentatives from four different colleges of UM- Dearborn will be .pdf
Representatives from four different colleges of UM- Dearborn will be .pdf
 
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdf
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdfProblem asks me to prove Uniqueness but Im not sure how to do it! .pdf
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdf
 
please send edited codeMain.javapackage part2;import java.util.pdf
please send edited codeMain.javapackage part2;import java.util.pdfplease send edited codeMain.javapackage part2;import java.util.pdf
please send edited codeMain.javapackage part2;import java.util.pdf
 
Inhaling and exhaling Label the figure that shows INHALATION and.pdf
Inhaling and exhaling  Label the figure that shows INHALATION and.pdfInhaling and exhaling  Label the figure that shows INHALATION and.pdf
Inhaling and exhaling Label the figure that shows INHALATION and.pdf
 
In accordance to the PLSS land description system, locate the section.pdf
In accordance to the PLSS land description system, locate the section.pdfIn accordance to the PLSS land description system, locate the section.pdf
In accordance to the PLSS land description system, locate the section.pdf
 
How can a topologically associating domain (TAD) mutation effect mor.pdf
How can a topologically associating domain (TAD) mutation effect mor.pdfHow can a topologically associating domain (TAD) mutation effect mor.pdf
How can a topologically associating domain (TAD) mutation effect mor.pdf
 
Hello, I need help writing a code in C. It wants to do things with f.pdf
Hello, I need help writing a code in C. It wants to do things with f.pdfHello, I need help writing a code in C. It wants to do things with f.pdf
Hello, I need help writing a code in C. It wants to do things with f.pdf
 
Fix the following C program in linux. When it is compiled it gives t.pdf
Fix the following C program in linux. When it is compiled it gives t.pdfFix the following C program in linux. When it is compiled it gives t.pdf
Fix the following C program in linux. When it is compiled it gives t.pdf
 
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
 
Examine your opinion on the death penalty. Defend why you are for th.pdf
Examine your opinion on the death penalty. Defend why you are for th.pdfExamine your opinion on the death penalty. Defend why you are for th.pdf
Examine your opinion on the death penalty. Defend why you are for th.pdf
 
Do you think that knowing about aggression between groups of chimpan.pdf
Do you think that knowing about aggression between groups of chimpan.pdfDo you think that knowing about aggression between groups of chimpan.pdf
Do you think that knowing about aggression between groups of chimpan.pdf
 
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdfDiana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
 
Create a new java class called ListNode. Implement ListNode as a gen.pdf
Create a new java class called ListNode. Implement ListNode as a gen.pdfCreate a new java class called ListNode. Implement ListNode as a gen.pdf
Create a new java class called ListNode. Implement ListNode as a gen.pdf
 
Briefly describe the two competing theories regarding the origin of H.pdf
Briefly describe the two competing theories regarding the origin of H.pdfBriefly describe the two competing theories regarding the origin of H.pdf
Briefly describe the two competing theories regarding the origin of H.pdf
 
Atlas Advertising Atlas Advertising is a regional advertising agency.pdf
Atlas Advertising Atlas Advertising is a regional advertising agency.pdfAtlas Advertising Atlas Advertising is a regional advertising agency.pdf
Atlas Advertising Atlas Advertising is a regional advertising agency.pdf
 

Recently uploaded

When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

Complete the following short answer questions1.  How do the virus.pdf

  • 1. Complete the following short answer questions: 1. How do the viruses propagate between computers? 2. What is social engineering? 3. How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement? 4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit access to an FTP server with IP address 10.32.67.112. 5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to open a connection to an FTP server? Explain. 6. For each of the following passwords, first state the kind of attack that would be necessary to crack it. Justify your answer. Then say whether or not it is an adequate password, again giving specific reasons. a) password b) Winter1 c) SpringBreaK d) 2!T*d (00-10) e) 9g&8tY7#?s+445=232+ Solution Answers: 1)How do the viruses propagate between computers? -> The browsers gain more features and functions more methods for virus propagation appear directly to a computer across the network. Web pages : ->Either via a download, web code, or a cross-site scripting (CSS) attack, web pages can be a source of viral infection. As browsers gain more features and functions more methods for virus propagation appear. Messages: -> E-mail messages as well as IM or chat messages can be a vector for viral infection. -> Whether the virus is spread through links, embedded code, or an attachment depends on the type of message and the client software. Infected programs or Trojans : -> Running an infected program that you copied from a CD or other media (or downloaded) is a means of infection. Sometimes the virus is a Trojan, where it appears to be a useful program, but
  • 2. is in fact a virus. 2. What is social engineering? -> Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. -> Social engineering is the art of manipulating people so they give up confidential information. -> A social engineer runs what used to be called a "con game. Popular types of social engineering attacks : 1)Phishing: -> Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. 2) Pretexting: ->Pretexting is another form of social engineering where attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal information. 3. How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement? -->Process it through the Access Control List (ACL) -> Stateful Packet Inspection: Connections have distinct states or stages. ->Different states are subject to different attacks. Stateful firewalls use different filtering rules for different states. Different because it uses filter rules in order to accept or deny traffic. ->An example would be windows firewall. 4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit access to an FTP server with IP address 10.32.67.112.? -> An access control list (ACL) is a table that tells a computer operating system which accessrights each user has to a particular system object, such as a file directory or individual file. -> ACLs are a network filter utilized by routers and some switches to permit and restrict data flows into and out of network interfaces. -> When an ACL is configured on an interface, the network device analyzes data passing through the interface. -> The list has an entry for each system user with access privileges. -> The most common privileges include the ability to read a file, to write to the file or files, and to execute the file. -> Microsoft Windows NT/2000, Novell'sNetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. -> More advanced lists have more distinct control, but the general guidelines are as follows: a) A sequence number or term name for each entry.
  • 3. b)A statement of permission or denial for that entry. c) the network protocol and associated function or ports. -> Examples include IP, IPX, ICMP, TCP, UDP, NETBIOS and many others. 5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to open a connection to an FTP server? Explain. ACL will apply it's three rules. 1. Allows all connections to port 25. 2. Allow single internal host on port 80. 3. Drops and logs other opening packets.