SEC571 2019 January Week 4 Quiz Midterm Latest

Question # 00715509 Posted By: rey_writer Updated on: 02/02/2019 05:33 AM Due on: 02/02/2019
Subject Education Topic General Education Tutorials:
Question
Dot Image

SEC571 Principles of Information Security and Privacy

Week 4 Midterm

Question 1

(TCO A) What are the four kinds of security threats? Give two examples of each.

Question 2

(TCO A) Explain the primary advantage of virtualization used in security of an operating system.

Question 3

(TCO B) It's been said that firewalls are dead. Some think that, because of the prevalence of application-layer attacks, packet filtering firewalls are of no real use in protecting networks. Name an advantage of using packet filtering firewalls in modern networks.

Question 4

(TCO C) Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentication, and integrity. Be specific as to the keys used and how they achieve the three goals.

Question 5

(TCO B) Which of the following is a correct statement?

                A SYN flood involves an attacker sending a stream of acknowledgements.

                In link encryption, packet confidentiality is assured from sending to receiving host.

                Access control is limiting who can access what in what ways.

                SSL assures data confidentiality within the recipient's network.

                None of the above

Dot Image
Tutorials for this Question
  1. Tutorial # 00716041 Posted By: rey_writer Posted on: 02/02/2019 05:34 AM
    Puchased By: 2
    Tutorial Preview
    The solution of SEC571 2019 January Week 4 Quiz Midterm Latest...
    Attachments
    Week_4_Midterm.doc (35 KB)

Great! We have found the solution of this question!

Whatsapp Lisa