logo

Crowdly

Information Technology and Cyber Security

Looking for Information Technology and Cyber Security test answers and solutions? Browse our comprehensive collection of verified answers for Information Technology and Cyber Security at lms.upes.ac.in.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Below are the two statements:

i) PGP and S/MIME both use X.509 certificates for key exchange.

ii) SSL and TLS operate at the application layer of the OSI model.

Choose the correct option for the above two statements.

0%
43%
14%
43%
View this question

Consider the following statements:

i) A public key can decrypt messages encrypted with a private key. 

ii) Hashing is reversible if you know the algorithm. 

iii) A honeypot has production value and is used to host critical enterprise applications. 

29%
57%
14%
0%
View this question

Based on the DDoS Attack Diagram , what role do Zombie systems play? (Select all that apply)

0%
0%
43%
100%
View this question

Which are valid wireless threats?

100%
100%
29%
86%
View this question

Which device operates at the network layer (OSI Layer 3) and filters traffic based on IP addresses?

0%
86%
14%
0%
View this question

PKI components include: 

86%
86%
14%
0%
View this question

Which of the following are disadvantages of RAID systems? (Select all that apply)

100%
100%
0%
100%
View this question

Match the following:

  1. DNS Poisoning | A. Switch MAC address tables

  2. MAC Spoofing | B. DNS resolver cache

  3. SYN Flood | C. TCP/IP three-way handshake

  4. Brute Force | D. Weak password policies

43%
0%
29%
0%
29%
View this question

Column A (Device)Column B (Function)
1. Proxy ServerA. Logs keystrokes of attackers
2. Honeypot B. Filters harmful websites
3. Internet Content FilterC. Acts as intermediary for client requests
4. Protocol AnalyzerD. Captures and decodes network packets

0%
71%
14%
14%
View this question

What is the primary function of an Intrusion Prevention System (IPS) compared to an IDS?

100%
0%
0%
14%
View this question

Want instant access to all verified answers on lms.upes.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!