Packets header information at the network

Assignment Help Accounting Basics
Reference no: EM13919998

1. T F Deep packet inspection firewalls protect networks by blocking packets based on the packets header information at the network (IP) layer. Answer: _____ If F, why?
Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications. Answer:
_____

2. T F Intrusion Detection Systems (IDS) provide no protection from internal threats.

Answer: _____

3. T F A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. Answer: _____

Security awareness, training, and education programs are key components of

organizational risk management strategies.

4. T F

Answer: _____

Part 2: Multiple Choice Questions. Print the correct answer in the blank following the

question. (22 questions at 2 points each, 40 points plus 4 bonus points in all)

1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below):
A. Network

B. Physical
applications.
C. Application
D. Transport

1. Coordinates communication between applications.
2. Supports useful functions over the transport layer such identity/location of
3. Moves information between hosts that are not directly connected.
4. Moves bits between the nodes in the network.

a. A--->3; B--->4; C--->2; D--->1
b. A--->2; B--->4; C--->1; D--->4
c. A--->2; B--->3; C--->4; D--->1
d. A--->3; B--->4; C--->1; D--->2
Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:
a. A patent
b. A copyright
c. A trademark
d. Ethical standards
Answer: _____

3. Security threats include which of the following:

Page 2 of 8

a.
b.
c.
d.
e.

Unlocked doors
Disgruntled employees
Hurricanes
Un-patched software programs
All of the above

Answer: _____

4. Denial of service attacks include (select one or more):
a. Buffer overflow attack
b. Smurf attack
c. Ping flood attack
d. SYN flood attack
e. All of the above
Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server. Inside the
utility is code that that will erase the servers hard drive contents on January 1st, 2016. This
is an example of which of the following attacks?
a.
b.
c.
d.
e.
f.
g.

Virus
Logic Bomb
Spoofing
Trojan horse
Botnet
Rootkit
Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process. Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret. They would like to protect this formula for as long as possible. What type of intellectual property protection best suits their needs?
a.
b.
c.
d.

Copyright
Trademark
Patent
Trade Secret

Answer: _______

7. You should clear cookies in your browser periodically because:
a. They (Cookies) can be used to track your web browsing behavior and invade your privacy.
b. They can facilitate impersonation attacks.
c. They can be used to spread viruses.

Page 3 of 8

d. a. & b.
e. b. & c.
f. a., b. & c.
Answer: _________

8.

A TCP/IP session hijacking can be best described as:
a.
b.
c.
d.

Providing false identity information to gain unauthorized access Establishing a connection without specifying a username or password
An attacker takes control of a session between the server and a client Flooding the connection with too many requests

Answer: _________

9. Tracker attacks in databases get around:
a. Anonymization
b. Data transformation
c. Query size restriction
d. Data partitioning
Answer: _________

10. A race condition attack can result in:
a. A symbolic link
b. Object orientation
c. A deadlock
d. Access to low address memory locations
Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.
a. Data perturbation
b. Database access control
c. Inference channeling
d. Output perturbation
Answer: _________

Page 4 of 8

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.
a. compromise
b. inference
c. partitioning
d. query restriction
Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?
a. IPSec
b. HTTP over SSL
c. Link encryption
d. Microsoft Encrypting File System (EFS)

Answer: ______

14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?

a. A firewall system at the connection point to the Internet
b. An improved RBAC-based access control system for the application servers
c. File-level encryption
d. Kerberos authentication
Answer: _______

Page 5 of 8

15. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?
a. A privacy policy
b. An authentication policy
c. An incident response policy
d. Wireless network access policy

Answer: ________

16. The security risk of allowing dynamic content ( to execute) on a target machine is:
a. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.
b. Malware may be included in the downloaded code and infect the target machine.
c. The mobile code author may never be known.
d. None of the above.
Answer: _______

17. Encrypting a message with a private key (of the sender) in an asymmetric system provides:
a. Proof of receipt
b. Confidentiality
c. Proof of origin
d. Message availability
Answer:_______

18. The correct ordering of the upper layers of the OSI model are:
a.
b.
c.
d.

Session, application, presentation
Session, presentation, application
Session, application, presentation, physical
Application, presentation, session, network

Answer: _______
19. In relational database parlance, the basic building block is a __________, which is a flat table.
a.
b.
c.
d.
e.

attribute
tuple
primary key
relation
field

Answer: _____

20. Routers operate at the _____________ of the OSI stack?
Page 6 of 8

a.
b.
c.
d.
e.

Transport
Application
Session
Network

Data Link

Answer: _____

21. Gateways operate at the _____________ of the OSI stack?
a. Transport
b. Application
c. Session
d. Network
e. Data Link
Answer: _____

22. Which e-mail security protocol(s) depend(s) upon a Web of Trust?
a. Kerberos
b. Public Key Infrastructure (PKI)
c. Secure Sockets Layer (SSL)
d. Transport Layer Security (TLS)
e. Pretty Good Privacy (PGP)
f. Secure Multipurpose Internet Mail Extensions (S/MIME)
g. Privacy Enhanced Mail (PEM)
h. Data Link

Answer: _____

Part 3: Short Answer Questions. (2 questions at 15 points each, 30 points in all; no more than 1 page, single-spaced for the answer to each question)
1. Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls

2. There are many threats associated with e-mail. List those threats and describe a mitigation strategy for each.

Part 4: Essay Question.

While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an

Page 7 of 8

elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur than inventor, quickly grasps the essence of Joes idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joes idea, Stan plans to hire a programmer to implement Joes algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this situation.

Reference no: EM13919998

Questions Cloud

Controversial corporate social responsibility : Analyze the relationship between business and society, and the ways in which they are part of an interactive system.Recommend ways stakeholders can influence the destiny of both business and society.Analyze the various primary and secondary stakehold..
Critique of southwire ethics policy : The Southwire Company is North America's leading manufacturer of wire and cable. Southwire maintains and publishes manuscripts detailing the organizations commitment to ethics. The manuscript can be accessed via the company website and through pri..
What possibilities of spending of capital budget on machine : What are the possibilities of spending some of the capital budget on a machine and or tools? What are ways of improving setup time, improving quality, increasing capacity, and determining EOQs?
What gaap rule would justify reporting the same event : Jan Perkins is a business consultant. She analyzed the business processes of one of her clients, Diamond Companies, in November 2013.
Packets header information at the network : Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to mo..
Determining the change real economic factors : 1) Why is it possible to change real economic factors in the short run simply by printing and distributing more money? 2) Explain why a stable 5% inflation rate can be preferable to one that averages 4% but varies between 1-7% regularly.
What is the cost savings per hour relative to the status quo : What is the cost savings per hour relative to the status quo? Assume that each teller is assigned to two stations exclusively, and that demand is divided equally among the stations.
Proposal for texting and driving : Research question: How effective are devices that disable in-car cellphone messaging in preventing deaths and accidents that are caused by texting and driving?
What are the elements of a market transaction : What are the elements of a market transaction? Explain the benefits and the costs resulting from a transaction. What is the difference between a buyer's perspective and a sellser's perspective?

Reviews

Write a Review

Accounting Basics Questions & Answers

  Fixed-asset turnover ratio

The balance sheets of Davidson Corporation reported net fixed assets of $320,000 at the end of 2011. The fixed-asset turnover ratio for 2011 was 4.0 and sales for the year totaled $1,480,000. Net fixed assets at the end of 2010 were ??

  Prepare journal entries on hunt company

Prepare the journal entry under basis 2, assuming that Ann Mount did not remit payment - Prepare journal entries on Hunt Company

  Assume the original facts except the land was valued at

lockhart corporation is a calendar-year corporation. at the beginning of 2013 its election to be taxed as an s

  On january 1 2011 nana company paid 100000 for 8100 shares

on january 1 2011 nana company paid 100000 for 8100 shares of papa company common stock. these securities were

  The stewart cake factory owns a building for its operations

the stewart cake factory owns a building for its operations. stewart uses only half of the building and is considering

  Taxation research and communication

The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources. These sources are continually changing and new laws are introduced at least annually.

  How should the auditor proceed to determine whether

how should the auditor proceed to determine whether accounts receiable and sales returns and allowances contains a

  Finding corporate strategy from annual reports

Review an annual report of a popular company ie. Target, Kohl's Bass Pro shops, and answer the following questions with references:

  Lupinski distributors has 1000000 shares of common stock

lupinski distributors has 1000000 shares of common stock outstanding. on january 11 of the current year lupinski

  The company pays its employees at the end of the day friday

the company pays its employees at the end of the day friday for work done during that five-day work-week. total wages

  Vintage cellars manufactures a 1000-bottle wine storage

evaluating decision-making scenarios using linear profit and cost modelingvintage cellars manufactures a 1000-bottle

  Interest in a limited liability company

In june 2009, joanne invested for a 20% interest in a limited liability company in which she is a material participant. The LLC reported losses of $340,000 in 2009 and $180,000 in 2010. Joanne's share of the LLC's losses was $68,000 in 2010 and $3..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd