- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
- •142. ______________ Firewall treats each network frame (Packet) in isolation.
- •143. How many keys are required for two people to communicate via a cipher?
- •144. ________________ - A software application which normally filters traffic entering or leaving a single computer.
- •144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
- •145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)
- •146. Which of the following statements is not true?
- •147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?
- •148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)
- •149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?
- •151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
- •152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
- •190. Dursi zhauabin tabu kerek
82. One of the most famous documented dDoS attacks Back. How does the Back work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
84. One of the most famous documented dDoS attacks Land. How does the Land work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
86. Using Magic Square cipher encrypt the message “MAJOR” with the given key 3 and generated magic square .<br/> .M..RJA.O
