- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
- •142. ______________ Firewall treats each network frame (Packet) in isolation.
- •143. How many keys are required for two people to communicate via a cipher?
- •144. ________________ - A software application which normally filters traffic entering or leaving a single computer.
- •144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
- •145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)
- •146. Which of the following statements is not true?
- •147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?
- •148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)
- •149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?
- •151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
- •152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
- •190. Dursi zhauabin tabu kerek
147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?
Выберите один ответ.
|
This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up. |
|
|
Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting. |
|
|
This attack makes hundreds of connections to the victim with the Secure Shell (SSH) Protocol without completing the login process. |
|
|
The victim's mail queue is flooded by an abundance of messages, causing system failure. |
|
|
The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them. |
|
148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)
Выберите по крайней мере один ответ:
|
By having the ability to "remember" the status of a connection, this method of packet screening is better equipped to guard against attacks than standard packet filtering. |
|
|
Rules and filters in this packet screening method can become complex, hard to manage, prone to error and difficult to test. |
|
|
Like packet filtering, stateful packet inspection does not break the client/server model and therefore allows a direct connection to be made between the two endpoints |
|
|
Stateful packet inspection compares the packets against the rules or filters and then checks the dynamic state table to verify that the packets are part of a valid, established connection. |
|
|
The packets are compared to pre-configured rules or filters and allow or deny decisions are made based on the results of the comparison. |
|
149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?
Выберите один ответ.
|
In a Mailbomb attack, attacker creates a packet that contains more than 65,536 bytes .This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting. |
|
|
In a Mailbomb attack, attacker exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up. |
|
|
In a Mailbomb attack, the victim is flooded with Internet Control Message Protocol (ICMP) "echo-reply" packets. |
|
|
In a Mailbomb attack, the attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them. |
|
|
In a Mailbomb attack, the victim's mail queue is flooded by an abundance of messages, causing system failure. |
|
150. A function that maps a variable-length data block or message into a fixed-length value called a hash code. The function is designed in such a way that, when protected, it provides an authenticator to the data or message. Also referred to as a message digest.
Выберите один ответ.
|
Honeypot |
|
|
Hash Function |
|
|
Feistel Cipher |
|
|
Kerberos |
|
|
Intrusion detection system |
|
