Looking for Information Technology and Cyber Security test answers and solutions? Browse our comprehensive collection of verified answers for Information Technology and Cyber Security at lms.upes.ac.in.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Below are the two statements:
i) PGP and S/MIME both use X.509 certificates for key exchange.
ii) SSL and TLS operate at the application layer of the OSI model.
Choose the correct option for the above two statements.
Consider the following statements:
i) A public key can decrypt messages encrypted with a private key.
ii) Hashing is reversible if you know the algorithm.
iii) A honeypot has production value and is used to host critical enterprise applications.
Based on the DDoS Attack Diagram , what role do Zombie systems play? (Select all that apply)
Which are valid wireless threats?
Which device operates at the network layer (OSI Layer 3) and filters traffic based on IP addresses?
PKI components include:
Which of the following are disadvantages of RAID systems? (Select all that apply)
DNS Poisoning | A. Switch MAC address tables
MAC Spoofing | B. DNS resolver cache
SYN Flood | C. TCP/IP three-way handshake
Brute Force | D. Weak password policies
Column A (Device) | Column B (Function) |
---|---|
1. Proxy Server | A. Logs keystrokes of attackers |
2. Honeypot | B. Filters harmful websites |
3. Internet Content Filter | C. Acts as intermediary for client requests |
4. Protocol Analyzer | D. Captures and decodes network packets |
What is the primary function of an Intrusion Prevention System (IPS) compared to an IDS?
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!