Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer the ALL the questions carefully. Thanks 6- A device Vendor is sell

ID: 3714022 • Letter: P

Question

Please answer the ALL the questions carefully. Thanks

6- A device Vendor is selling a product that can monitor network traffic and detect a wide spectrum of threats. Each packet is inspected and logged after being checked against a database of known attacks. Unfortunately, the device cannot actively shape network traffic. Which of the following is the best description of the device? A) NIDS B) HIPS C) HIDS D) NIPS 7- A company's chief security officer (CSO) has been receiving the reports of people looking through the building's window at night. Which of the following detective controls should the (CSO) implement in this situation? A) CCTV B) Fencing C) Lighting D) Barricades 8- A software development company has developed a patch for its most popular software application. The company has decided to make the patch available for download on the company's public website. In the past, the company has had problems with rogue patches that contains exploitable code circulating to owners of the company's software application. The company has asked IT security analyst to develop a cryptography method that would allow customers to know the patch they are applying is authentic. Which of the following would meet this requirement and best prevent collision attacks? A) MD5 B) SHA-256 C) PGP with 1024-bit key D) AES 128 9- Which of the following attacks is used when entering a URL incorrectly into the web browser? A) Cross-site scripting B) Spoofing C) Typo squatting D) Man-in-the-middle 10- A Security administrator is concerned with moving a sensitive application to a cloud provider and requires that the data in memory also be encrypted. Which of the following describes this types of encrypting? A) TCP wrappers B) Data in usa C) Block cipher D) Data in transite

Explanation / Answer

6. NIPS A NIPS in some form is vital for any computer network that can be accessed by unauthorized persons. Computers holding sensitive data always need protection; however, even seemingly insignificant networks can be hijacked for use in botnet attacks.

7. CCTV -- for recorded constant observation who is watchning through.

8. AES 128

9. Typo squatting

10. Block cipher --  is an encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers.