Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
IT quiz
Please answer the following questions in a word doc
Thank you
a) Which of the following is considered the first line of defense against human behavior? Explain.
A) PoliciesB) CryptographyC) Physical securityD) Business continuity planning
b) Select from the following the best definition of security risk analysis:A) Risk analysis looks at the probability that a vulnerability exists in your system.B) Risk analysis looks at the probability that your security measures won't stop a hacker breaking in to your system.C) Risk analysis looks at the probability that a hacker may break in to your system.D) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them.E) Risk analysis looks at the consequences of being connected to the Internet.
c) Which answer governs how a network might be configured and operated as well as how people are expected to behave on it? Explain.A) Network documentationB) RegulationsC) ProceduresD) Policies
d) Which answer is one that contains actions to be taken in a certain situation like how long before users must change passwords, actions to take if an infiltration takes place or a users steals corporate date? Explain. A) PoliciesB) DocumentationC) RegulationsD) Procedures
PROBLEM 2 - Networking Fundamentals (20 points)(5 pts each)
a) While using which type of networking device would each host 'see' all other traffic on the network? Explain.A) Network SwitchB) Network RouterC) Network HubD) Token Ring Network
b) Which type of network device divides broadcast domains? Explain.A) SwitchesB) HubsC) RoutersD) Bridges
c) What destination MAC Address would be added to a packet on the route to a remote computer? Explain.A) MAC Address of the far side of the default gatewayB) MAC Address of your computerC) Exterior MAC Address of the remote ServerD) Interior MAC address of default gateway
d) You have two network segments separated by a router. A host on one segment does an ARP request for a certain IP Address. Would that request cross the router? Explain.A) Yes, because routers forward broadcastsB) Yes, if there is a hub between segmentsC) Only if you have a Caching EngineD) No, routers do not forward broadcasts
PROBLEM 3 - Cryptography Fundamentals (20 points)(5 pts each)
a) Users in your organization sign their emails with digital signatures. What provides integrity for these certificates? Explain.A) HashingB) EncryptionC) Non-repudiationD) Private key
b) Bob wants to send a secure email to Alice so he decides to encrypt it. Bob wants to ensure that Alice can verify that he sent it. Which of the following does Alice need to verify the certificate that Bob used in this process is valid? Explain.A) Alice’s public keyB) Alice’s private keyC) Bob's private keyD) Bob's public keyE) The CA’s private keyF) The CA’s public key
c) Which cryptographic system provides both data security and non-repudiation? Explain.A) 3DES - Triple Data Encryption StandardB) PKI - Public Key InfrastructureC) DES - Data Encryption StandardD) AES - Advanced Encryption Standard
d) When a user needs to provide message integrity, what options may be the best?A) Send a digital signature of the message to the recipientB) Encrypt the message with a symmetric algorithm and send itC) Create a checksum, append it to the message, encrypt the message, then send it to the recipientD) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key
PROBLEM 4 - Network Vulnerabilities, Attacks and Countermeasures (20 points)(5 pts each)
a) Which of the following is not to be considered a cyber attack? Explain.A) A nuclear electromagnetic pulse (EMP) that knocks out all electronic devices.B) Trust exploitation.C) Access control.D) Port redirection.E) Man-in-the-middle.
b) Which denial of service attack involves sending crafted ICMP packets which have a source address of the victim and all responses go to the victim?A) Macro VirusB) SYN FloodC) Smurf AttackD) Buffer Overflow
c) Security experts at your organization have determined that your network has been repeatedly attacked from multiple entities in a foreign country. Research indicates these are coordinated and sophisticated attacks. What best describes this activity?A) Targeted attackB) SniffingC) Spear phishingD) Advanced persistent threat
d) Which component of an effective penetration test involves contacting users and asking questions about the corporate network in an attempt to gather intelligence? Explain.A) Man-in-the-Middle AttackB) PhishingC) Spear PhishingD) Social Engineering
PROBLEM 5 - Authentication and Authorization Controls (20 points)(5 pts each)
a) Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other’s public key. A wants to send B some message M. A selects random DES key K and send B the following two messages:
-- Epub(B)( K, Sigprv(A)(K))-- EK(M)
"E" means encryption and "Sig" means digital signature. Which of the following statement(s) is true? Briefly explain why or why not.(A) Only B can decipher the contents of the message M(B) B is certain that the message M is from A(C) B can prove to a third party that the message M arrived from A.
b) The security manager at your company recently updated the security policy. One of the changes requires dual-factor authentication. Which of the following will meet this requirement? Explain.A) Fingerprint scan and retina scanB) Password and PINC) Hardware token and PIND) Smart card
c) Apart from having strong passwords, what can mitigate brute force logon attempts? Explain.A) Automatic Account LockoutsB) Renaming Administrator AccountsC) Disable the Administrator AccountD) Security Audits
d) A network includes a ticket-granting ticket server. Which of the following choices is the primary purpose of this server? Explain.A) Access controlB) AuthenticationC) AuthorizationD) Identification