Packets header information at the network

Assignment Help Accounting Basics
Reference no: EM13919998

1. T F Deep packet inspection firewalls protect networks by blocking packets based on the packets header information at the network (IP) layer. Answer: _____ If F, why?
Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications. Answer:
_____

2. T F Intrusion Detection Systems (IDS) provide no protection from internal threats.

Answer: _____

3. T F A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. Answer: _____

Security awareness, training, and education programs are key components of

organizational risk management strategies.

4. T F

Answer: _____

Part 2: Multiple Choice Questions. Print the correct answer in the blank following the

question. (22 questions at 2 points each, 40 points plus 4 bonus points in all)

1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below):
A. Network

B. Physical
applications.
C. Application
D. Transport

1. Coordinates communication between applications.
2. Supports useful functions over the transport layer such identity/location of
3. Moves information between hosts that are not directly connected.
4. Moves bits between the nodes in the network.

a. A--->3; B--->4; C--->2; D--->1
b. A--->2; B--->4; C--->1; D--->4
c. A--->2; B--->3; C--->4; D--->1
d. A--->3; B--->4; C--->1; D--->2
Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:
a. A patent
b. A copyright
c. A trademark
d. Ethical standards
Answer: _____

3. Security threats include which of the following:

Page 2 of 8

a.
b.
c.
d.
e.

Unlocked doors
Disgruntled employees
Hurricanes
Un-patched software programs
All of the above

Answer: _____

4. Denial of service attacks include (select one or more):
a. Buffer overflow attack
b. Smurf attack
c. Ping flood attack
d. SYN flood attack
e. All of the above
Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server. Inside the
utility is code that that will erase the servers hard drive contents on January 1st, 2016. This
is an example of which of the following attacks?
a.
b.
c.
d.
e.
f.
g.

Virus
Logic Bomb
Spoofing
Trojan horse
Botnet
Rootkit
Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process. Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret. They would like to protect this formula for as long as possible. What type of intellectual property protection best suits their needs?
a.
b.
c.
d.

Copyright
Trademark
Patent
Trade Secret

Answer: _______

7. You should clear cookies in your browser periodically because:
a. They (Cookies) can be used to track your web browsing behavior and invade your privacy.
b. They can facilitate impersonation attacks.
c. They can be used to spread viruses.

Page 3 of 8

d. a. & b.
e. b. & c.
f. a., b. & c.
Answer: _________

8.

A TCP/IP session hijacking can be best described as:
a.
b.
c.
d.

Providing false identity information to gain unauthorized access Establishing a connection without specifying a username or password
An attacker takes control of a session between the server and a client Flooding the connection with too many requests

Answer: _________

9. Tracker attacks in databases get around:
a. Anonymization
b. Data transformation
c. Query size restriction
d. Data partitioning
Answer: _________

10. A race condition attack can result in:
a. A symbolic link
b. Object orientation
c. A deadlock
d. Access to low address memory locations
Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.
a. Data perturbation
b. Database access control
c. Inference channeling
d. Output perturbation
Answer: _________

Page 4 of 8

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.
a. compromise
b. inference
c. partitioning
d. query restriction
Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?
a. IPSec
b. HTTP over SSL
c. Link encryption
d. Microsoft Encrypting File System (EFS)

Answer: ______

14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?

a. A firewall system at the connection point to the Internet
b. An improved RBAC-based access control system for the application servers
c. File-level encryption
d. Kerberos authentication
Answer: _______

Page 5 of 8

15. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?
a. A privacy policy
b. An authentication policy
c. An incident response policy
d. Wireless network access policy

Answer: ________

16. The security risk of allowing dynamic content ( to execute) on a target machine is:
a. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.
b. Malware may be included in the downloaded code and infect the target machine.
c. The mobile code author may never be known.
d. None of the above.
Answer: _______

17. Encrypting a message with a private key (of the sender) in an asymmetric system provides:
a. Proof of receipt
b. Confidentiality
c. Proof of origin
d. Message availability
Answer:_______

18. The correct ordering of the upper layers of the OSI model are:
a.
b.
c.
d.

Session, application, presentation
Session, presentation, application
Session, application, presentation, physical
Application, presentation, session, network

Answer: _______
19. In relational database parlance, the basic building block is a __________, which is a flat table.
a.
b.
c.
d.
e.

attribute
tuple
primary key
relation
field

Answer: _____

20. Routers operate at the _____________ of the OSI stack?
Page 6 of 8

a.
b.
c.
d.
e.

Transport
Application
Session
Network

Data Link

Answer: _____

21. Gateways operate at the _____________ of the OSI stack?
a. Transport
b. Application
c. Session
d. Network
e. Data Link
Answer: _____

22. Which e-mail security protocol(s) depend(s) upon a Web of Trust?
a. Kerberos
b. Public Key Infrastructure (PKI)
c. Secure Sockets Layer (SSL)
d. Transport Layer Security (TLS)
e. Pretty Good Privacy (PGP)
f. Secure Multipurpose Internet Mail Extensions (S/MIME)
g. Privacy Enhanced Mail (PEM)
h. Data Link

Answer: _____

Part 3: Short Answer Questions. (2 questions at 15 points each, 30 points in all; no more than 1 page, single-spaced for the answer to each question)
1. Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls

2. There are many threats associated with e-mail. List those threats and describe a mitigation strategy for each.

Part 4: Essay Question.

While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an

Page 7 of 8

elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur than inventor, quickly grasps the essence of Joes idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joes idea, Stan plans to hire a programmer to implement Joes algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this situation.

Reference no: EM13919998

Questions Cloud

Controversial corporate social responsibility : Analyze the relationship between business and society, and the ways in which they are part of an interactive system.Recommend ways stakeholders can influence the destiny of both business and society.Analyze the various primary and secondary stakehold..
Critique of southwire ethics policy : The Southwire Company is North America's leading manufacturer of wire and cable. Southwire maintains and publishes manuscripts detailing the organizations commitment to ethics. The manuscript can be accessed via the company website and through pri..
What possibilities of spending of capital budget on machine : What are the possibilities of spending some of the capital budget on a machine and or tools? What are ways of improving setup time, improving quality, increasing capacity, and determining EOQs?
What gaap rule would justify reporting the same event : Jan Perkins is a business consultant. She analyzed the business processes of one of her clients, Diamond Companies, in November 2013.
Packets header information at the network : Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to mo..
Determining the change real economic factors : 1) Why is it possible to change real economic factors in the short run simply by printing and distributing more money? 2) Explain why a stable 5% inflation rate can be preferable to one that averages 4% but varies between 1-7% regularly.
What is the cost savings per hour relative to the status quo : What is the cost savings per hour relative to the status quo? Assume that each teller is assigned to two stations exclusively, and that demand is divided equally among the stations.
Proposal for texting and driving : Research question: How effective are devices that disable in-car cellphone messaging in preventing deaths and accidents that are caused by texting and driving?
What are the elements of a market transaction : What are the elements of a market transaction? Explain the benefits and the costs resulting from a transaction. What is the difference between a buyer's perspective and a sellser's perspective?

Reviews

Write a Review

Accounting Basics Questions & Answers

  How much control does fed have over this longer real rate

Hubbard argues that the Fed can control the Fed funds rate, but the interest rate that is important for the economy is a longer-term real rate of interest.   How much control does the Fed have over this longer real rate?

  Coures:- fundamental accounting principles

Coures:- Fundamental Accounting Principles: - Explain the goals and uses of special journals.

  Accounting problems

Accounting problems,  Draw a detailed timeline incorporating the dividends, calculate    the exact Payback Period  b)   the discounted Payback Period. the IRR,  the NPV, the Profitability Index.

  Write a report on internal controls

Write a report on Internal Controls

  Prepare the bank reconciliation for company

Prepare the bank reconciliation for company.

  Cost-benefit analysis

Create a cost-benefit analysis to evaluate the project

  Theory of interest

Theory of Interest: NPV, IRR, Nominal and Real, Amortization, Sinking Fund, TWRR, DWRR

  Liquidity and profitability

Distinguish between liquidity and profitability.

  What is the expected risk premium on the portfolio

Your Corp, Inc. has a corporate tax rate of 35%. Please calculate their after tax cost of debt expressed as a percentage. Your Corp, Inc. has several outstanding bond issues all of which require semiannual interest payments.

  Simple interest and compound interest

Simple Interest, Compound interest, discount rate, force of interest, AV, PV

  Capm and venture capital

CAPM and Venture Capital

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd