Take your learning further Show Take your learning furtherMaking the decision to study can be a big step, which is why you’ll want a trusted University. We’ve pioneered distance learning for over 50 years, bringing university to you wherever you are so you can fit study around your life. Take a look at all Open University courses. If you’re new to university-level study, read our guide on Where to take your learning next, or find out more about the types of qualifications we offer including entry level Access modules, Certificates, and Short Courses. Want to achieve your ambition? Study with us and you’ll be joining over 2 million students who’ve achieved their career and personal goals with The Open University. Browse all Open University courses Cryptography and Network Security- Module 51. _____________ is data interception method used by hackers. 2. Sniffing is also known as ___________________ 3. _____________ are programs or devices that capture the vital information from the target network or particular network. 4. Which of them is not an objective of sniffing for hackers? 5. Which of the following tech-concepts cannot be sniffed? 6. Which of the following tech-concepts cannot be sniffed? 7. Which of the
below-mentioned protocol is not susceptible to sniffing? 8. Which of the below-mentioned protocol is not susceptible to sniffing? 9. There are __________ types of sniffing. 10. Active sniffing is difficult to detect. Learn Cryptography and System Security from Scratch 11. Which of the following is not a sniffing tool? 12. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division. 13. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division. 14. In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack. 15. __________________ are those devices which can be plugged into your network at the hardware level & it can monitor traffic. 16. Which of the following is not a transport layer vulnerability? 17. Which of the following is not session layer vulnerability? 18. Failed sessions allow brute-force attacks on access
credentials. This type of attacks are done in which layer of the OSI model? 19. Transmission mechanisms can be subject to spoofing & attacks based on skilled
modified packets. 20. Which of the following is not an example of presentation layer issues? Learn Cryptography and System Security from Scratch 21. Which of the following is not a vulnerability of the application layer? 22. Which of the following is an example of Transport layer vulnerability? 23. Which of the following is an example of session layer vulnerability? 24. Which of the following is an example of presentation layer vulnerability? 25. Which of the following is an
example of application layer vulnerability? 26. __________ is a naming
system given to different computers which adapt to human-readable domain names. 27. DNS stands for _____________ 28. Some security issues might exist owing to misconfigured __________________ which can direct to
disclosure of information regarding the domain. 29. ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP
settings. 30. _____________ can be attained by the use of malware or by changing the server’s settings. Learn Cryptography and System Security from Scratch 31. There are _________ main types of DNS
hijacking. 32. DNS trojans are used for performing a type of DNS hijacking. 33. The _______________ matches and maps to the user friendly domain name. 34. Which of the following is not an example of DNS hijacking? 35. A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records. 36.
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet. 37. DNS poisoning
is very dangerous because it can extend its reach from one ___________ to another. 38. A _________________ can be poisoned
if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it. 39. The ____________ Domain Name Server data will get spread to the ISPs & will be cached there. 40. The user could be influenced by DNS
hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship. Learn Cryptography and System Security from Scratch 41. A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle. 42. During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. 43.
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website. 44. DoS is abbreviated as
_____________________ 45. A DoS attack coming from a large number of IP addresses, making it hard to manually
filter or crash the traffic from such sources is known as a _____________ 46. DDoS stands for _________________ 47. Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the
targeted website. 48. There are ______ types of DoS attack. 49. Application layer DoS attack is also known as _______________ 50. ___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing. Learn Cryptography and System Security from Scratch 51. Which of the following is not a type of application layer DoS? 52. Network layer attack is also known as ________________ 53. Which of the following do not comes under network layer DoS flooding? 54. Which of the following do not comes under network layer DoS flooding? 55. DDoS are high traffic events that are measured in
Gigabits per second (Gbps) or packets per second (PPS). 56. A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures. 57. Internet Control Message Protocol (ICMP) has been designed to compensate _________ 58. Header size of the ICMP message is _________ 59. During error reporting, ICMP always reports error messages to ________ 60. Which of these is not a type of error-reporting message? Learn Cryptography and System Security from Scratch 61. ICMP error message will not be generated for a datagram having a special address such as _______ 62. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram. 63. The source-quench message in ICMP was designed to add a kind of ____________ to the IP. 64. In case of time exceeded error, when the datagram visits a router, the value of time to live field is _________ 65. Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them. 66. During debugging, we can use the ____________ program to find if a host is alive and responding. 67. In windows ____________ can be used to trace the route of the packet from the source to the destination. 68. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ___________ 69. Network layer firewall works as a __________ 70. Network layer firewall has two sub-categories as _________ Learn Cryptography and System Security from Scratch 71. A firewall is installed at the point
where the secure internal network and untrusted external network meet which is also known as __________ 72. Which of the following is / are the types of firewall? 73. A proxy firewall filters at _________ 74. A packet filter firewall filters at __________ 75. What is one advantage of setting up a DMZ with two
firewalls? 76. What tells a firewall
how to reassemble a data stream that has been divided into packets? 77.
A stateful firewall maintains a ___________ which is a list of active connections. 78. A firewall needs to be __________ so that it can grow proportionally with the network that
it protects. What is a set of steps that converts readable text into unreadable text?Encryption is used to convert readable text or plain text into unreadable text or cipher text. Encryption is a two way data conversion technique, meaning data which is encrypted can also be decrypted (if you have the decryption key).
What is unencrypted readable data called?Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.
What purpose was the BSA formed?The BSA provides a foundation to promote financial transparency and deter and detect those who seek to misuse the U.S. financial system to launder criminal proceeds, finance terrorist acts, or move funds for other illicit purposes. The BSA requires each bank to establish a BSA/AML compliance program.
What should an AUP specify?An AUP sets rules related to an organization's IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures.
|