Reference no: EM132972480
Assessment Task: Knowledge Workbook
Test concepts and procedures for cyber security
Question 1: Identify 2 current cyber threats, which can include trojan, virus or a worm, with a paragraph description of each.
Question 2: Describe the following types of attacks:
- Denial of Service
- Distributed Denial of Service
Your response must include legal implications and mitigation strategies for each attack.
Question 3: Identify 1 method of DNS attack & mitigation strategies used to defend against this type of attack.
Question 4: Describe what is meant by term, ‘Zero day' Vulnerability. Give one (1) example of a ‘Zero-day Exploit'.
Question 5: Define the term ‘CVE'. In your response, give 1 example of a CVE and include the URL from the source.
Question 6: Identify two (2) WLAN hardware vulnerabilities and give a brief description of each issue.
Question 7: Identify 2 WLAN software vulnerabilities and provide a brief description of each issue.
Question 8: Investigate the OWASP Top !0 Vulnerabilities. Choose 1 Vulnerability and discuss its features.
Question 9: Identify two (2) application layer security vulnerabilities and provide the basic characteristics of each security vulnerability.
Each vulnerability should be at least (1) paragraph.
Question 10: Referring to Question 9 security vulnerabilities, identify a policy or mitigation technique that is used to enhance the security of the application.
Question 11: Describe both DoS & DDoS Attack methodologies. Use a case example in your response.
Question 12: Describe the fundamental phases of the Penetration Testing Execution Standard.
Question 13: Explain any legal implications that may arise from exceeding the scope of an agreed penetration test.
Question 14: The following image is of a scan taken on a Windows 10 workstation. Identify the toolsets available from the image. You may use FortiClient to assist with your research.
Attachment:- Test concepts and procedures for cyber security.rar
Prepare the environment and create the virtual machines
: Prepare the virtual environment, create & install a Kali Linux and a Broken Virtual Machine, configure & test connectivity, complete maintenance tasks
|
Prepare an entry to record depreciation expense on december
: Prepare an entry to record depreciation expense on 31 December 2019. Alexander Ltd completed the following transactions during 2019.
|
What is the fair price of this financial product
: The payoff at the final date is given by $1000+max($IT-$4000,0), What is the fair price of this financial product
|
Show journal entries to transfer the amounts to land account
: Show journal entries to transfer the amounts to three different accounts, i.e. Land account, Buildings account and Machinery account.
|
Describe fundamental phases of the penetration testing
: Describe the fundamental phases of the Penetration Testing Execution Standard and Explain any legal implications that may arise from exceeding the scope
|
Compute the value of deferred tax asset and liabilities
: Warranties expenditures are deductible when paid. The company's effective tax rate is 25%. Compute the value of deferred tax asset and liabilities
|
What entry should the partnership record for partner a
: Find what entry should the partnership record? Partner A has a capital of $444,000, and a Partner B has $327,000, when partner B sells the partnership interest.
|
Briefly describe the common web application security
: Briefly describe the common Web application security risks and vulnerabilities based on the OWASP framework
|
How many chairs should Cari produce in December
: Finished goods inventory at the end of November was 4,000 units. How many chairs should Cari produce in December
|