Identify the software development life cycle

Assignment Help Computer Network Security
Reference no: EM133309624

QuestionS

1. Identify the Software Development Life Cycle (SDLC) step where developers perform "black box" or "grey box" analysis to test for vulnerabilities in the published application, as well as in its publication environment.

A. Testing

B. Implementation

C. Planning

D. Maintenance

2. A hacker who is attempting a whale phishing attack would want to gain what type of company information?

A. Market share

B. Employee salaries

C. File server name

D. Patents

3. In terms of systems vulnerability scanning, which example fits that of a false negative?

A. Exposed threats without being aware of them

B. An alert that matches CVE

C. Overwhelm analysis and response resources

D. Make use of common identifiers

4. Incoming requests from IP address ranges that are reserved for internal, private, loopback, and multicast use are obviously spoofed. What are these packets known as?

A. Bolons

B. Martian packets

C. Bolians

D. Bolo

5. A security engineer reviews event logs and discovers a malicious command and control implementation on a server that involves port forwarding. Jumping into action, the engineer promptly removes which threat type?

A. Advanced Persistent Threat

B. Data exfiltration

C. Hacktivist

D. Zero-day

6. An expert on malicious software has isolated a new virus inside a VM to monitor and study its behavior. The malware expert is able to monitor for changes to processes and services, monitor network sockets for attempted connections, and monitor all system calls and API calls made by programs. The malware expert is able to take periodic snapshots of the environment, record file creation/deletion during the malware's execution, and even dump the virtual machine's memory at key points during execution. Analyze the technique being used to allow the expert to study the malware.

A. Grayhat

B. Whitelisting

C. Sandboxing

D. Sinkholing

7. HTTP is a stateless protocol, meaning that the server preserves no information about the client. As most web applications depend on retaining information about clients, various mechanisms have been used to preserve this sort of stateful information. Name one method of storing these states.

A. Smishing

B. Sandboxing

C. Cookies

D. Vishing

Reference no: EM133309624

Questions Cloud

Which psychiatric disorders can result in suicidal ideations : What other information should you ask J.B. regarding his thoughts of suicide?What characteristics of J.B. put him at high risk for suicide?
What does eric x. li: a tale of two political systems video : What does Eric X. Li: A tale of two political systems video analyze and try to discuss with the audience and What is his video trying to tell us
Symmetric and asymmetric encryption : Explain the difference between symmetric and asymmetric encryption with respect to the keys each uses.
What is your advice to your client has come to your office : Your client has come to your office for advice after receiving notice from their lender that they are initiating foreclosure on their primary residence.
Identify the software development life cycle : Identify the Software Development Life Cycle (SDLC) step where developers perform "black box" or "grey box" analysis to test for vulnerabilities
Examine the different strategies countries around the world : Examine the different strategies countries around the world have adopted to meet the costs of medical care in comparison with the United States
Create a clear thesis statement and craft your essay : Create a clear thesis statement and craft your essay around supporting and explaining this thesis. The thesis should relate to the topic (environmental impact)
Correlating packet trace destination : The identification of malware happens by using an IP Address and Domain Name System (DNS) Analysis by correlating a packet trace destination
Why gender dynamics represent distinctive of urban legends : Explore how genders in urban legends emphasize major arguments about identity, difference, and conflict across boundaries of sexuality.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create diagram of dsl and cable modem connection to your isp

Create a diagram of the DSL and Cable Modem connections to your ISP, cable organization, and telecom to your home router using Visio or its open source alternative software.

  Explain how you would integrate security requirements

Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system

  Describe the three logical components of an ids

Provide an example of an activity that may occur in each of the attack steps used by an intruder. Describe the three logical components of an IDS.

  Assessment of the risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).

  Create a weighted ranking according to your own evaluation

Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

  Processes on a system share no resources

Assume that processes on a system share no resources. Is it possible for one process to block another processes' access to a resource? Why or why not? From your answer, argue that denial of service attacks are possible or impossible.

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Explore and analyse information security threats

Assessment Three - Cyber intelligence is the ability to define, explore and analyse information security threats. Advanced adversaries accomplish their goals using advanced tools

  Should copyright laws protect musical compositions

Which is more likely to be effective in protecting intellectual property in digital media such as CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures? Or is it hopeless to try to protect ..

  Investigate the potential security issues

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides).

  What are the primary threats to physical security

What is physical security? What are the primary threats to physical security? How are these threats manifested in attacks against the organization?

  Prepare research paper on defending against virus attacks

Prepare a research paper on Defending against Virus Attacks - You will create a 6 to 8 page research paper. Please include an introduction, body and conclusion. You need to also include at least eight references with in-text citations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd