Unless specified otherwise all multiple-choice questions have only one correct answer. You should provide a short explanation for the selected answer and do not forget to cite full reference when necessary. Plagiarism percentage is less than 5%.

 

a)      Ann wants to send a secure encrypted email to Joe, and wants to ensure that Joe can verify that she sent it. Which of the following does Joe need to verify the certificate that Ann used in this process is valid?

A)  Anns public key

B)  Anns private key

C)  Joe’s private key

D)  Joe’s public key


E)  The CAs private key

F)  The CAs public key

 

b)      Which of the following is the preferred system that provides both data security and non- repudiation?

A)  PPTP – Point-to-Point Tunneling Protocol

B)  3DES  Triple Data Encryption Standard

C)  PKI  Public Key Infrastructure

D)  RSA  Data Security

 

c)      When a user needs to provide message authenticity, in the absence of a secure channel, what options may bethe best?

A)  Send a digital signature of the message to the recipient

B)  Encrypt the message with a symmetric algorithm and send it

C)  Create a checksum, append it to the message, encrypt the message, then send it to the recipient

D)  Encrypt the message with a private key so the recipient can decrypt with the corresponding publickey

 

d)      Which of the following hardware based encryption devices is used as a part of multi- factor authentication to access a secured computing system?

A)  Database encryption

B)  USB encryption.

C)  Whole disk encryption

D)  TPM

 

 

Network Vulnerabilities, Attacks and Countermeasures

 

a)      Which of the following is the primary risk from using outdated software?

A)    It may not have all the features you need.

B)   It may not have the most modern security features.

C)   It may no longer be supported by the vendor.

D)    It may be easier to break into than newer software.

 

b)      An attacker sent multiple broadcast messages to the network routers, spoofing an IP address of one of the network servers. This caused the network to send a flood of packets to that server and it is no longer responding.What best describes this attack?

A)    DDoS attack

B)   TCP SYN flood attack

C)   Smurf Attack

D)    TCP hijacking attack

 

c)      A network admin has noticed that several machines on her network are infected with malware that is sendinga flood of packets to a target external to the network. What best describes this attack?

A)    Backdoor

B)   SYN Flood

C)   DDoS

D)    Botnet

 

d)      Which of the following is not to be considered a cyber attack?

A)    A nuclear electromagnetic pulse (EMP) that knocks out all electronic devices.

B)   Trust exploitation.

C)   Penetration testing.

D)    Port redirection.

E)   Man-in-the-middle.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


“Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!”