SEC571 2019 January Week 4 Quiz Midterm Latest

SEC571 Principles of Information Security and Privacy
Week 4 Midterm
Question 1
(TCO A) What are the four kinds of security threats? Give two examples of each.
Question 2
(TCO A) Explain the primary advantage of virtualization used in security of an operating system.
Question 3
(TCO B) It's been said that firewalls are dead. Some think that, because of the prevalence of application-layer attacks, packet filtering firewalls are of no real use in protecting networks. Name an advantage of using packet filtering firewalls in modern networks.
Question 4
(TCO C) Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentication, and integrity. Be specific as to the keys used and how they achieve the three goals.
Question 5
(TCO B) Which of the following is a correct statement?
A SYN flood involves an attacker sending a stream of acknowledgements.
In link encryption, packet confidentiality is assured from sending to receiving host.
Access control is limiting who can access what in what ways.
SSL assures data confidentiality within the recipient's network.
None of the above

-
Rating:
5/
Solution: SEC571 2019 January Week 4 Quiz Midterm Latest