logo

Crowdly

ICT379 Security Architectures and Systems Administration (tjd, 2025)

Looking for ICT379 Security Architectures and Systems Administration (tjd, 2025) test answers and solutions? Browse our comprehensive collection of verified answers for ICT379 Security Architectures and Systems Administration (tjd, 2025) at moodleprod.murdoch.edu.au.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

If it detects a threat, an IPS can ____.

0%
0%
0%
100%
View this question

Which of the following options lists all the seven fields of the </etc/passwd> file in the correct order?

0%
0%
0%
100%
View this question

This questions lead on from the lab activity but requires further research using https://httpd.apache.org/docs/2.4/

You are a server administrator in your organisation and responsible for the Ubuntu web server (your org really likes Ubuntu).  Auditing policies require that the following information is logged in the default Apache log file which is not typically logged with the default log file:

  • Size of response in bytes
  • Remote user if the request was authenticate
  • Contents of the cookie AUTHID in requests send to the server

To differentiate from the default log format, the modified format should be given the name: custom_combined

Your answer must contain the following things:

  1. Description where Apache logs information by default
  2. Explanation on how to customise the logging including names of config files, config directives required and explaining any processes required to change the configuration of the server

It is not required to actually implement this and any syntax errors will be ignore wrt marking, but your answer needs to contain actual configuration directives, file names and commands involved and not just vague explanations.

View this question

Explain the concept of interposable libraries: what are they for, in which case can they applied, how do they work?

View this question

As part of securing a web site you are tasked with developing a regular expression that can be used to validate flight ticket numbers as entered by users. The flight ticket numbers have the following format:

AA-NN[N][N]-YYYY-MM-DD-CCCCCC

The different fields are explained below:

  1. AA is a two character upper case airline code where each character can be from the whole alphabet (we won't need stricter checking here as in actually checking for valid 2-character airline codes)
  2. NN[N][N] is a flight number which is either 2, 3 or 4 digits long (note that the square brackets here indicate that the 3rd and 4th digits are optional and the square brackets are not part of the format)
  3. YYYY is the year, assume we accept all values between 2000 and 2099
  4. MM is the month, this is always specified as two digits (with leading 0 if necessary)
  5. DD is the day of the month specified as two digits (with leading 0 if necessary)
  6. CCCCCC is a 6 digit number

All these fields are separated by hyphens.

For the purpose of the exercise, you do not need to consider valid year/month/day combinations and you only need to check each in isolation. For example, 2021-09-31 is valid here. However, your solution must NOT explicitly list all the valid numbers for years, months or days.

You must explain your solution, but no more than one short sentence (or bullet point) for each of the fields.

View this question

Explain the rationale for and the overall approach of the ring-based architecture implemented on Intel (and compatible) processors. 

View this question

Explain the three core principles of the CIA triad and for each name at least one technique that can be used to maintain/implement the principle.

View this question

Employing defence in depth increases the complexity of compromising computer systems. Describe the concept of defence in depth, and provide an example.

View this question

Explain the principle of least privilege based on the example of Kali Linux which in 2020 abolished the principle of logging in and working as root by default. Your answer should explain the principle itself and wrt Kali Linux the issue and how it was solved.

View this question

With regards to secure programming / software security, explain what fuzzing is, including making clear what its purpose is, and how fuzzing differs from normal testing.

View this question

Want instant access to all verified answers on moodleprod.murdoch.edu.au?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!