Details of this Paper

sec 370 web security




1. (TCO 5) What is a weakness of symmetric encryption? (Points: 5) Modern math processors can break it quickly.;It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.;Since the key must be transmitted, the scheme is only as secure as your transport method.;Throughput is minimal, making it a poor choice for large files.;Symmetric key encryption has no weaknesses.;Question 2. 2. (TCO 5) Which is an asymmetric key encryption system? (Points: 5) SSL;DES;PGP;NSA;Question 3. 3. (TCO 6) A good definition of VPNs is they are a combination of authentication, access control, _____ (Points: 5) tunneling, and dial up;tunneling, and encryption;leased lines, ISP, and piggy backing;Internet direct access, and dial up;Question 4. 4. (TCO 6) IPSEC supports which two types of modes? Tunnel and: (Points: 5) Transport;Bridge;Insecure;non IP;Question 5. 5. (TCO 4) What profiling types are used in anomaly detection? (Points: 5) Deflection and deterrence;Resource and user/group work;Infiltration and preemptive blocking;Snort and Cisco intrusion detection;Question 6. 6. (TCO 8) What Windows account types are most attractive to attackers? (Points: 5) Administrators, IUSR_Machine name;Guests, backdoors;Apache, sysadam;DC security, HIsecdc;Question 7. 7. (TCO 8) The most powerful account to have in a Linux system is: (Points: 5) Admin;Null;Root;Apache


Paper#70403 | Written in 18-Jul-2015

Price : $22