Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION8 Which of l Certificate Trusted cortificate authortes come precontigure

ID: 3917084 • Letter: Q

Question

QUESTION8 Which of l Certificate Trusted cortificate authortes come precontigured in browser software QUESTION9 Match the defintian and term A breach B aud Ccountermeasure D isk management E ereat Gein unauhorized access to resources or data or make them available to unauthorized Check who has logged onto a notwork, accessed resources, or used group or user privileges Identifying and minimizing possible events that are a danger to the network and data QUESTION 10 Which of the following makes IP the most vulnerable? O IP packets are broken up into fragments for transmission The data inthe IP packet is not checked for errors. O iP headers are stripped off and replaced by each router in the path taken by the IP packet QUESTION 11 d and highest skilled True False

Explanation / Answer

Answer is as follows :

a) The correct options are for given scenario :

Certificate authorities identify the entities of requesting certificates and also verify domain ownership.

One certificate authority can't sign certificte of other authorities.

So correct options are 2 and 4.

b)

1. Gain unauthorized access to resource or data to make them in unauthorized individuals - Breaches(A)

2. Check who has loggged into a network, access resources... - Audit (B) , it is done manually

3. An action to prevent or respond an attack - Countermeasure (C)

4. identify and minimize possible events that are danger to network.. - Risk Management (D), helps to minimize risks

c)

The correct option of IP vulnerabilty is that IP addresses are stipped off and replace by each router in the path by IP packet. Because of possibilty of being attacked is at routers in given scenario.

So the correct option is 4..

d) The given scenario is True

if there is any query please ask in comments..