The document contains 20 multiple choice questions about various topics in information security including public key cryptography, phishing, digital certificates, VPN security, risk analysis, HTML, secret document transmission, message authentication codes, web beacons, network security measures, types of attacks, ISMS establishment sequence, digital signatures, biometric authentication, database security, Trojan horses, incident response, public key encryption, and S/MIME functions. The questions test knowledge of technical security concepts and appropriate security controls and procedures.
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. At the receiving side this information is stored and used to filter unwanted traffic and traceback the source of distributed attack. This article describes the simulation and its results of the combined method.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1)Which of the following are Penetration testing methodologysandibabcock
1)
Which of the following are Penetration testing methodology?
A. White box model
B. Black box model
C. Gray box model
D. All of the above
2)
Which of the following skills are needed to be a security tester?
A. Knowledge of network and computer technology
B. Ability to communicate with management and IT personnel
C. An understanding of the laws in your location and ability to use necessary tools
D. All of the above
3)
Which of the following are the district layer of TCP/IP?
A. Network and Internet
B. Transport and Application
C. Network, Internet, Transport, Presentation
D. A and B
4)
Which of the followings are the TCP segment flags?
A.
SYN flag
: synch flag ,
ACK flag
: acknowledgment flag
B.
PSH flag
: push flag,
URG flag
: urgent flag, STF flag: set test flag
C.
PSH flag
: push flag,
URG flag
: urgent flag,
RST flag
: reset flag,
FIN flag
: finish flag
D. A and C
5)
Which of the following are properties of User Datagram Protocol (UDP)?
A. Fast but unreliable delivery protocol and Operates on Transport layer
B. Used for speed but Does not need to verify receiver is listening or ready
C. Depends on higher layers of TCP/IP stack handle problems and Referred to as a connectionless protocol
D. All of the above
6)
Distributed denial-of-service (DDoS) attack is:
A. Attack on host from single servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
B. Attack on host from multiple servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
C. Attack on server from multiple host or workstations and Network could be flooded with billions of packets causes Loss of bandwidth and Degradation or loss of speed
D. None of the above
7)
Different categories of Attacks are:
A. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow
B. Ping of Death, Session hijacking
C. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow, Ping of Death, Port High jacking (PoH)
D. A and B
8)
Which of the following are Social Engineering Tactics?
A. Persuasion, Intimidation, Coercion
B. Persuasion, Intimidation, Coercion, Extortion, blackmailing
C. Persuasion, Intimidation, Coercion, Extortion, Urgency
D. All of the above
9)
Which of the following/s are types of Port Scans?
A. ACK scan, FIN scan, UDP scan
B. SYN scan, NULL scan, XMAS scan,
C. ACK scan, FIN scan, UDP scan, SYN scan, NULL scan, XMAC scan
D. A and B
10)
Enumeration extracts information about:
A. Resources or shares on the network
B. Usernames or groups assigned on the network
C. User’s password and recent logon times
D. All of the above
11)
Which of the following are NetBIOS Enumeration Tools?
A. Nbtstat command, Net view command, Net use command
B. Nbtstat command, Net view command, Dumpsec command
C. Nbtstat command, ...
1) Which of the following are Penetration testing methodology .docxSONU61709
1) Which of the following are Penetration testing methodology?
A. White box model
B. Black box model
C. Gray box model
D. All of the above
2) Which of the following skills are needed to be a security tester?
A. Knowledge of network and computer technology
B. Ability to communicate with management and IT personnel
C. An understanding of the laws in your location and ability to use necessary tools
D. All of the above
3) Which of the following are the district layer of TCP/IP?
A. Network and Internet
B. Transport and Application
C. Network, Internet, Transport, Presentation
D. A and B
4) Which of the followings are the TCP segment flags?
A. SYN flag: synch flag , ACK flag: acknowledgment flag
B. PSH flag: push flag, URG flag: urgent flag, STF flag: set test flag
C. PSH flag: push flag, URG flag: urgent flag, RST flag: reset flag, FIN flag: finish flag
D. A and C
5) Which of the following are properties of User Datagram Protocol (UDP)?
A. Fast but unreliable delivery protocol and Operates on Transport layer
B. Used for speed but Does not need to verify receiver is listening or ready
C. Depends on higher layers of TCP/IP stack handle problems and Referred to as a connectionless protocol
D. All of the above
6) Distributed denial-of-service (DDoS) attack is:
A. Attack on host from single servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
B. Attack on host from multiple servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
C. Attack on server from multiple host or workstations and Network could be flooded with billions of packets causes Loss of bandwidth and Degradation or loss of speed
D. None of the above
7) Different categories of Attacks are:
A. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow
B. Ping of Death, Session hijacking
C. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow, Ping of Death, Port High jacking (PoH)
D. A and B
8) Which of the following are Social Engineering Tactics?
A. Persuasion, Intimidation, Coercion
B. Persuasion, Intimidation, Coercion, Extortion, blackmailing
C. Persuasion, Intimidation, Coercion, Extortion, Urgency
D. All of the above
9) Which of the following/s are types of Port Scans?
A. ACK scan, FIN scan, UDP scan
B. SYN scan, NULL scan, XMAS scan,
C. ACK scan, FIN scan, UDP scan, SYN scan, NULL scan, XMAC scan
D. A and B
10) Enumeration extracts information about:
A. Resources or shares on the network
B. Usernames or groups assigned on the network
C. User’s password and recent logon times
D. All of the above
11) Which of the following are NetBIOS Enumeration Tools?
A. Nbtstat command, Net view command, Net use command
B. Nbtstat command, Net view command, Dumpsec command
C. Nbtstat command, Net view command, Hyena command
D. None of the above
12) D ...
DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. At the receiving side this information is stored and used to filter unwanted traffic and traceback the source of distributed attack. This article describes the simulation and its results of the combined method.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1)Which of the following are Penetration testing methodologysandibabcock
1)
Which of the following are Penetration testing methodology?
A. White box model
B. Black box model
C. Gray box model
D. All of the above
2)
Which of the following skills are needed to be a security tester?
A. Knowledge of network and computer technology
B. Ability to communicate with management and IT personnel
C. An understanding of the laws in your location and ability to use necessary tools
D. All of the above
3)
Which of the following are the district layer of TCP/IP?
A. Network and Internet
B. Transport and Application
C. Network, Internet, Transport, Presentation
D. A and B
4)
Which of the followings are the TCP segment flags?
A.
SYN flag
: synch flag ,
ACK flag
: acknowledgment flag
B.
PSH flag
: push flag,
URG flag
: urgent flag, STF flag: set test flag
C.
PSH flag
: push flag,
URG flag
: urgent flag,
RST flag
: reset flag,
FIN flag
: finish flag
D. A and C
5)
Which of the following are properties of User Datagram Protocol (UDP)?
A. Fast but unreliable delivery protocol and Operates on Transport layer
B. Used for speed but Does not need to verify receiver is listening or ready
C. Depends on higher layers of TCP/IP stack handle problems and Referred to as a connectionless protocol
D. All of the above
6)
Distributed denial-of-service (DDoS) attack is:
A. Attack on host from single servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
B. Attack on host from multiple servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
C. Attack on server from multiple host or workstations and Network could be flooded with billions of packets causes Loss of bandwidth and Degradation or loss of speed
D. None of the above
7)
Different categories of Attacks are:
A. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow
B. Ping of Death, Session hijacking
C. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow, Ping of Death, Port High jacking (PoH)
D. A and B
8)
Which of the following are Social Engineering Tactics?
A. Persuasion, Intimidation, Coercion
B. Persuasion, Intimidation, Coercion, Extortion, blackmailing
C. Persuasion, Intimidation, Coercion, Extortion, Urgency
D. All of the above
9)
Which of the following/s are types of Port Scans?
A. ACK scan, FIN scan, UDP scan
B. SYN scan, NULL scan, XMAS scan,
C. ACK scan, FIN scan, UDP scan, SYN scan, NULL scan, XMAC scan
D. A and B
10)
Enumeration extracts information about:
A. Resources or shares on the network
B. Usernames or groups assigned on the network
C. User’s password and recent logon times
D. All of the above
11)
Which of the following are NetBIOS Enumeration Tools?
A. Nbtstat command, Net view command, Net use command
B. Nbtstat command, Net view command, Dumpsec command
C. Nbtstat command, ...
1) Which of the following are Penetration testing methodology .docxSONU61709
1) Which of the following are Penetration testing methodology?
A. White box model
B. Black box model
C. Gray box model
D. All of the above
2) Which of the following skills are needed to be a security tester?
A. Knowledge of network and computer technology
B. Ability to communicate with management and IT personnel
C. An understanding of the laws in your location and ability to use necessary tools
D. All of the above
3) Which of the following are the district layer of TCP/IP?
A. Network and Internet
B. Transport and Application
C. Network, Internet, Transport, Presentation
D. A and B
4) Which of the followings are the TCP segment flags?
A. SYN flag: synch flag , ACK flag: acknowledgment flag
B. PSH flag: push flag, URG flag: urgent flag, STF flag: set test flag
C. PSH flag: push flag, URG flag: urgent flag, RST flag: reset flag, FIN flag: finish flag
D. A and C
5) Which of the following are properties of User Datagram Protocol (UDP)?
A. Fast but unreliable delivery protocol and Operates on Transport layer
B. Used for speed but Does not need to verify receiver is listening or ready
C. Depends on higher layers of TCP/IP stack handle problems and Referred to as a connectionless protocol
D. All of the above
6) Distributed denial-of-service (DDoS) attack is:
A. Attack on host from single servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
B. Attack on host from multiple servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed
C. Attack on server from multiple host or workstations and Network could be flooded with billions of packets causes Loss of bandwidth and Degradation or loss of speed
D. None of the above
7) Different categories of Attacks are:
A. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow
B. Ping of Death, Session hijacking
C. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow, Ping of Death, Port High jacking (PoH)
D. A and B
8) Which of the following are Social Engineering Tactics?
A. Persuasion, Intimidation, Coercion
B. Persuasion, Intimidation, Coercion, Extortion, blackmailing
C. Persuasion, Intimidation, Coercion, Extortion, Urgency
D. All of the above
9) Which of the following/s are types of Port Scans?
A. ACK scan, FIN scan, UDP scan
B. SYN scan, NULL scan, XMAS scan,
C. ACK scan, FIN scan, UDP scan, SYN scan, NULL scan, XMAC scan
D. A and B
10) Enumeration extracts information about:
A. Resources or shares on the network
B. Usernames or groups assigned on the network
C. User’s password and recent logon times
D. All of the above
11) Which of the following are NetBIOS Enumeration Tools?
A. Nbtstat command, Net view command, Net use command
B. Nbtstat command, Net view command, Dumpsec command
C. Nbtstat command, Net view command, Hyena command
D. None of the above
12) D ...
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
Question 1
The OSI model has seven layers where each layer performs various functions that are integrated to ensure that the network performs efficiently. The layers are arranged as follows from the bottom to the top layer:
a) The physical layer:
This is the first layer of the model and it has several functions. These are:
i. Bit synchronization:
The physical layer is very crucial in terms of timing and synchronizing the period and the amount of bits that are transferred between the sender and the recipient of a message. It uses a clock to ensure accurate and reliable synchronization.
ii. Bit rate control:
The physical layer also controls the bandwidth in a network by determining the number of bits that are transferred over the network channel within the specified time which is seconds in most cases.
iii. Physical topologies:
The physical layer also determines the design which is used to connect all the devices that make up the network. These include routers, switches, hubs and other equipment used in a network.
iv. Transmission mode:
The connection of devices in the physical layer determines how data between the communicating devices flows. There are various transmission modes which are supported by the physical layer. These are simplex, half-duplex and full-duplex. In simplex, data flows in only one direction. In half-duplex data can flow in both directions but not simultaneously. In the full-duplex transmission mode, data flows in both directions at the same time.
b) Data Link Layer:
This is the second layer of the OSI model. Some of its functions include:
i. Framing:
Data that is being transmitted is segmented into pieces known as frames to make the transmission process easier. The Data link layer facilitates the framing process to ensure that the receiver acquires the accurate and relevant information within the shortest possible time.
ii. Physical addressing:
The frames require adequate data regarding the sender and the recipient to ensure that a message does not fail to reach the intended recipient. The Data Link Layer achieves this by adding a MAC address to the header section of each of the frames that are being transmitted.
iii. Error control:
The use of frames in the DLL enables the network layer to detect when frames do not reach the intended recipient. In return, the DLL is able to retransmit the lost or damaged frames using the details in the headers.
iv. Flow control:
The DLL ensures that the flow of data between the sender and the recipient is constant. This techniques ensures the stability of the communication channel that is established when transmitting data.
v. Access control:
The assigning of MAC addresses to all the computers in a network enables the Data Link Layer to determine the machines with access to certain resources.
c) Network layer:
The functions of the third OSI model layer are:
i. Routing:
The network layer assesses the different routes that a frame can use to reach its recipient and it chooses the best rou ...
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Describe briefly the OSI Reference model and its relevance to computer security. [4 Marks]
• Ans 1: The Open System Interconnection Model (OSI) is a standardized framework for describing how computers communicate with each other over a network system. The OSI model also conceptualizes how data flows through a stack of seven layers, beginning with the physical layer and continuing through the datalink, network, transport, session, presentation, and finally the application layer (Simoneau, 2006)
OWASP Top 10 - Insecure Communication
Here we have discussed the below-mentioned topics;
What is Insecure Communication?
Threat Agents related to communication.
Insecure Communication Reasons like Poor Handshaking, Weak Re-negotiation, Intercepting traffic, and Plaintext Data Communication.
Four Types of Renegotiations & main problems related to them.
Are You Vulnerable to Insecure Communication?
How To Prevent Insecure Communication?
Common Scenarios.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...ijsptm
The IP(Internet Protocol) spoofing is a technique that consists in replacing the IP address of the sender by
another sender’s address. This technique allows the attacker to send a message without being intercepted
by the firewall. The most used method to deal with such attacks is the technique called "Network Ingress
Filtering". This technique has been used, initially, forIPv4 networks, but its principles, are currently
extended toIPv6 networks.Unfortunately, it has some limitations, the main is its accuracy. To improve
safety conditions, we applied the "First-Come First-Serve (FCFS)" technique, applied for IPV6 networks,
and developed by the "Internet Engineering Task Force (IETF)" within its working group "Source Address
Validation Improvements (SAVI)", which is currently being standardization. In this paper, we remember
the course of an attack by IP Spoofing and expose the threats it entails.Then, we explain the "Network
Ingress Filtering" technique. Next, We present the FCFS SAVI method and methodology that we have
adopted for its implementation.Finally, we, followingthe results, discuss and compare the advantages,
disadvantages andlimitations of the FCFSSAVI methodto thoseknown in the "Network Ingress Filtering"
technique. FCFS SAVI method is more effective than the technique of "Network Ingress Filtering", but
requires some improvements, for dealing with limitations it presents.
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxcravennichole326
Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network
interconnection devices
D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers
C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead
C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C.
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxelbanglis
Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network
interconnection devices
D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers
C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead
C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C ...
2. 1. In public key cryptography, which of the
following key can be used for decrypting the
data that is encrypted by using the server’s
public key?
a) Client’s private key
b) Client’s public key
c) Server’s private key
d) Server’s public key
3. 2. Which of the following is an appropriate
description of phishing?
a) It is a technique for fooling users into visiting a hostile or
untrusted website through spam messages and divulging
personal data such as accounting numbers, passwords, and
other confidential information.
b) It is an attempt to prevent legitimate users from accessing
network services, by sending repetitive data packets to a
targeted system from a number of systems called botnets.
c) It goes through every possible combination of numbers, letters,
and symbols in order to login to the system by defeating
password security.
d) It has the capability to capture and analyze data from
information packets that travel over a network. That data may
include user names, passwords, and proprietary information in
plain text.
4. 3. In an electronic transaction that employs public key
cryptography, which of the following is created by the
certification authority (CA), a third party independent of
the parties involved in the transaction?
a) The digital signatures of the parties involved in the
transaction
b) The electronic certificates for the private keys of the parties
involved in the transaction
c) The electronic certificates for the public keys of the parties
involved in the transaction
d) The passwords of the parties involved in the transaction
5. 4. Which of the following is an appropriate
description concerning Internet VPN
security?
a) A virtual network is configured, so there is no way to prevent a third
party that is not qualified to participate in the network from
wiretapping or falsification.
b) The virtual tunnel of Internet VPN is a dedicated channel between
specified LANs, so there is no function for protecting data that
passes along this route from wiretapping.
c) There is no capability for identifying individual people who are
qualified to participate in the network.
d) There is no risk of abusing the IP address for unauthorized access
or intrusion, so there is no need to encrypt the entire packet
including the IP address.
6. 5. Which of the following is an
appropriate description
concerning risk analysis?
a) It takes too much time and cost to handle all potential risks, so the
damage costs and occurrence probabilities should be estimated in
advance and priority should be given in accordance with the
magnitude of risks.
b) Risk analysis should not be repeated until all measures against the
previously analyzed and evaluated risks are implemented.
c) The objective of risk analysis is to estimate the amount of damage
associated with the occurrence of risks, so the cost of implementing
countermeasures should be determined in proportion to the amount
of damage.
d) The objective of risk analysis is to prevent future losses, so data
accumulated from past similar projects should not be used as
reference.
7. 6. Which of the following is a meta-language that
includes self-defining markup symbols called tags to
describe the content of a Web page or file and
supports bi-directional hyperlinks with high affinity to
the Internet?
a) HTML
b) SGML
c) UML
d) XML
8. 7. When secret documents are sent and
received using public key cryptography,
which of the following is an appropriate
description of the key management?
a) The decryption key must be kept private, but the
encryption key is public.
b) The encryption and decryption keys may be
public, but the encryption algorithm must be kept
private.
c) The encryption key may be public, but the
encryption algorithm must be kept private.
d) The encryption key must be kept private, but the
decryption key is public.
9. 8. In the context of message
authentication code, which of the
following is the purpose of using
message digests?
a) To check a summary of the message
b) To check the message encryption method
c) To confirm that no message has been tampered
with
d) To ensure message confidentiality
10. 9. Which of the following is an appropriate
explanation of Web beacons?
a) Images embedded in Web pages to gather
information such as user access trends
b) Latent errors in application programs used on Web
sites
c) Unauthorized techniques to inflict damage on both
PCs and Web servers themselves, through malicious
script
d) Viruses downloaded from Web sites that delete
image files on a PC
11. 10. Which of the following is an
appropriate description concerning
security measures for network
systems?
a) By using a circuit-switched network with closed-area connection functions,
limiting connections to particular user groups is an effective way to prevent
unauthorized external access.
b) In ISDN and packet-switched lines, it is possible to confirm the other party
based on the subscriber number which is received in notification at the time of
connection. This is referred to as callback.
c) Installing a line encryption device between DTEs (such as communication
control units and terminal equipment) and DCEs (such as modems and
DSUs) as an encryption method for each transmission segment requires
modification of some existing hardware and software.
d) Using a wireless LAN is an effective way to prevent interception of
transmissions because there is no cable in between.
12. 11. There are two types of attacks which an
information system might face: active attack and
passive attack. Which of the following is categorized
as an active attack?
a) Analysis of data traffic
b) DoS (Denial of Service)
c) Falsification of data
d) Replay of messages
13. 12. Which of the following shows the appropriate
sequence of items 1 through 3 that are required for
establishing ISMS according to ISO/IEC27001:2005?
[Items]
1. Prepare a Statement of Applicability
2. Select control objectives and controls for the
treatment of risks
3. Analyze and evaluate the risks
a) 1→2→3
b) 1→3→2
c) 2→3→1
d) 3→2→1
14. 13. Which of the following can be achieved by receiving
mail text and its hash value from the sender and
comparing the hash value with the one calculated from the
mail text by the receiver? Here, the hash value from the
sender is protected.
a) Confirmation of e-mail delivery
b) Detection of presence or absence of falsification
c) Prevention of spoofing
d) Prevention of tapping
15. 14. When the judgment threshold is changed in a biometric
authentication system, which of the following shows the
relationship between FRR (False Rejection Rate) and FAR
(False Acceptance Rate)?
a) As FRR decreases, FAR decreases.
b) As FRR decreases, FAR increases.
c) As FRR increases, FAR increases.
d) FRR and FAR are independent.
16. 15. As shown in the figure, an application on a client has access
to the database on a server via a pair of database connection
programs. Which of the following is the appropriate measure for
preventing the data transmitted and received between the
database connection programs from being wiretapped on a
communication line?
a) Changing the default port number provided by the database management
system to another number, which is used for communication by the
database connection programs
b) Encrypting the communication between the database connection
programs on the client and server sides
c) Restricting the IP addresses of the clients that have access to the
database connection program on the server side to only those required
d) Setting a password that is required to start and stop the database
17. 16. Which of the following sends a
program incorporating fraudulent
functions, such as destruction and
falsification of data, for installation and
execution?
a) Buffer overflow attack
b) Dictionary attack
c) DoS attack
d) Trojan horse
18. 17. A Web server was invaded from the
outside, and its contents were falsified.
Which of the following is the appropriate
sequence of subsequent activities?
Analyze each log on the server, IDS (Intrusion Detection System),
(1) and the firewall to identify the method used to gain unauthorized
access, the extent of the impact, and the path of the invasion.
Reconstruct the system, and apply the latest patches and security
(2)
setting information.
(3) Disconnect the server from the network.
(4) Monitor for a while after connecting the server to the network.
a)(1) → (2) → (3) → (4)
b)(1) → (3) → (2) → (4)
c) (2) → (3) → (1) → (4)
d)(3) → (1) → (2) → (4)
19. 18. When a message is sent to Person A from Person B
using public key cryptography, which of the following keys
should be used for encrypting the message?
a) A’s private key
b) A’s public key
c) B’s private key
d) B’s public key
20. 19. Which of the following is the function of
S/MIME used for e-mails?
a) Compressing e-mails
b) Encrypting e-mails and attaching a signature
c) Notifying senders that e-mails have been delivered
and opened
d) Resending e-mails
21. 20. Which of the following can be achieved
by using SSL/TLS?
a) Communication between clients and servers is encrypted.
b) Processing time is shortened in communication between clients and
servers.
c) The SMTP connection from mail software to a Web server is
enabled.
d) The trails of communication between browsers and Web servers are
secured.
22. 21. Which of the following refers to online scams where
thieves attempt to entice e-mail recipients into clicking on a
link that takes them to a bogus website, and the website
may prompt the recipient to provide personal information
such as social security number, bank account number, and
credit card number, and/or it may download malicious
software onto the recipient’s computer?
a) Cross site scripting
b) DoS attack
c) Phishing
d) Trojan horse
23. 22. A government website accepts passport applications using
HTTP forms to collect information. Users provide complete
personal information in the forms to help expedite processing of
face-to-face transactions, and payments are done offline. The
information collected enters a secure server for processing and
document releasing. In this system environment, which of the
following is the most likely security attack?
a) Password-guessing attack
b) Sniffing traffic for identity theft
c) Spamming to attain denial of service
d) Spoofing attack
24. 23. Which of the following explains the
pattern matching method that is used by
antivirus software?
a) Viruses are detected by comparing files before infection with
files after infection to investigate whether any change has
been made to the files.
b) Viruses are detected by comparison with the file checksum.
c) Viruses are detected by comparison with the signature codes
of known viruses.
d) Viruses are detected by monitoring the system for abnormal
phenomena caused by viruses.
25. 24. Which of the following is an algorithm that can be used
for asymmetric (or public key) cryptography?
a) AES
b) DES
c) RC4
d) RSA
26. 25. In e-commerce such as mail-order business, there is a
risk that dealers or users are damaged by falsifying,
spoofing, and repudiation at the time of sales order or
purchase order. Which of the following is an appropriate
security technology that can cope well with all of these
three threats?
a) Digital signature
b) Firewall
c) Junk mail filter
d) Virus check
27. 26. Which of the following is an appropriate
description concerning the PIN (Personal
Identification Number) of an IC card used for
user authentication?
a) Every PIN is set by combining the number information
stamped on the surface of an IC card.
b) Since each user can be identified with an IC card, all
users have a common PIN to reduce administrative
burden.
c) When an IC card is lost, a new one is issued and a
PIN is set. After that, the lost IC card is canceled.
d) When an IC card is sent, its PIN is not sent under the
same cover. The user is notified of the PIN in another
way.
28. 27. When a biometric authentication system is
installed, which of the following is the most
appropriate point to be considered?
a) Combining various measures, such as heuristics, in
addition to frequent update of pattern files
b) Requesting a trusted third party to issue an
individual user’s digital certificate
c) Setting up the system in consideration of both the
probability of incorrectly rejecting an authorized user
and that of incorrectly accepting an unauthorized
user
d) Using a library capable of sanitizing data which can
cause a system malfunction
29. 28. Which of the following is an explanation of a risk
transfer?
a) Breaking down or aggregating risks into components
that can be easily handled
b) Eliminating risk factors
c) Reducing the incidence of losses
d) Taking financial measures such as purchasing
insurance
30. 29. A message with a digital signature is received via e-
mail. Which of the following can be checked by verifying
the digital signature of the received message?
a) The e-mail has not been leaked.
b) The e-mail has not been relayed improperly.
c) The message has not been falsified.
d) The message has not been retransmitted on a specific
date and time.
31. 30. When Mr. A sends his confidential message to Mr. B by using
public key cryptography as shown in the figure below, which of the
following is the appropriate key K used for encryption?
“I will transfer next month.” “I will transfer next month.”
Decrypt with Mr. B’s
Mr. A Encrypt with key K Mr. B
private key
“nd359fxj47ac ...” Network “nd359fxj47ac ...”
a) Common private key
b) Mr. A’s private key
c) Mr. A’s public key
d) Mr. B’s public key
32. 31. Which of the following is a technique of social
engineering that obtains sensitive or confidential data by
searching for residual data left in a computer after job
execution or by examining discarded or stolen media such
as printed papers, tapes, and discs?
a) Salami technique
b) Scavenging
c) Sniffing
d) Spoofing
33. 32. Which of the following is a collection of infected
computers that have been compromised without their
owners realizing it and are being remotely controlled by
attackers, in order to typically send spam or attack other
computers?
a) Botnet
b) Honeynet
c) Rootkit
d) Web beacon
34. 33. A packet filtering-type firewall is installed at the
connection point between an in-house network and the
Internet. When the firewall makes possible access to the
Web server (port number 80) on the Internet from a PC on
the in-house network, which of the following is the
appropriate combination that is permitted by the packet
filtering rules?
Source Destination
Source Destination
port number port number
Outgoing packet PC Web server 80 1024 or more
a)
Response packet Web server PC 1024 or more 80
Outgoing packet PC Web server 1024 or more 80
b)
Response packet Web server PC 80 1024 or more
Outgoing packet Web server PC 80 1024 or more
c)
Response packet PC Web server 80 1024 or more
Outgoing packet Web server PC 1024 or more 80
d)
Response packet PC Web server 80 1024 or more
35. 34. Which of the following is the protocol
that is expanded and standardized based
on SSL (Secure Sockets Layer) v3 but
cannot interoperate with SSL?
a) IPsec (Internet protocol security)
b) RSH (Remote shell protocol)
c) SSH (Secure shell protocol)
d) TLS (Transport layer security protocol)
36. 35. Which of the following provides a
baseline of security requirements for the
operations of CA (Certification Authority)
and RA (Registration Authority)?
a) Certificate policy
b) Certificate practice statement
c) Statement of applicability
d) System security policy
37. 36. Which of the following is an appropriate description
concerning a digital envelope?
a) The sender and recipient must securely share a single private
key in advance, and the key is used for both encryption and
decryption.
b) The sender encrypts a hash of the data with the sender’s
private key. The recipient decrypts it by using the sender’s
public key, and checks if it matches a hash the recipient
computes.
c) The sender encrypts the message by using symmetric key
cryptography and then encrypts the symmetric key by using
public key cryptography.
d) The sender encrypts the message by using the recipient’s
public key prior to sending it. The recipient decrypts the
message with the recipient’s private key.
38. 37. There are two methods of biometric authentication:
one extracts physical characteristics and the other
extracts behavioral characteristics. Which of the following
uses behavioral characteristics?
a) Authentication is performed by extracting characteristics from
the branch angle of a branch point of a blood vessel and from
the distance between branch points.
b) Authentication is performed by extracting characteristics from
the chaotic pattern of wrinkles spreading out from the pupil.
c) Authentication is performed by extracting characteristics from
the writing speed and pen pressure used when a signature is
produced.
d) Authentication is performed by extracting characteristic points
called minutiae from the pattern formed by ridge lines.
39. 38. Which of the following is a method that is
used to check if an image or other digital
content has been illegally copied and resold?
a) Digital certificate
b) Digital preservation
c) Digital signature
d) Digital watermark