Looking for ICT379 Security Architectures and Systems Administration (tjd, 2025) test answers and solutions? Browse our comprehensive collection of verified answers for ICT379 Security Architectures and Systems Administration (tjd, 2025) at moodleprod.murdoch.edu.au.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
If it detects a threat, an IPS can ____.
Which of the following options lists all the seven fields of the </etc/passwd> file in the correct order?
This questions lead on from the lab activity but requires further research using https://httpd.apache.org/docs/2.4/
You are a server administrator in your organisation and responsible for the Ubuntu web server (your org really likes Ubuntu). Auditing policies require that the following information is logged in the default Apache log file which is not typically logged with the default log file:
To differentiate from the default log format, the modified format should be given the name: custom_combined
Your answer must contain the following things:
It is not required to actually implement this and any syntax errors will be ignore wrt marking, but your answer needs to contain actual configuration directives, file names and commands involved and not just vague explanations.
Explain the concept of interposable libraries: what are they for, in which case can they applied, how do they work?
As part of securing a web site you are tasked with developing a regular expression that can be used to validate flight ticket numbers as entered by users. The flight ticket numbers have the following format:
AA-NN[N][N]-YYYY-MM-DD-CCCCCC
The different fields are explained below:
All these fields are separated by hyphens.
For the purpose of the exercise, you do not need to consider valid year/month/day combinations and you only need to check each in isolation. For example, 2021-09-31 is valid here. However, your solution must NOT explicitly list all the valid numbers for years, months or days.
You must explain your solution, but no more than one short sentence (or bullet point) for each of the fields.
Explain the rationale for and the overall approach of the ring-based architecture implemented on Intel (and compatible) processors.
Explain the three core principles of the CIA triad and for each name at least one technique that can be used to maintain/implement the principle.
Employing defence in depth increases the complexity of compromising computer systems. Describe the concept of defence in depth, and provide an example.
Explain the principle of least privilege based on the example of Kali Linux which in 2020 abolished the principle of logging in and working as root by default. Your answer should explain the principle itself and wrt Kali Linux the issue and how it was solved.
With regards to secure programming / software security, explain what fuzzing is, including making clear what its purpose is, and how fuzzing differs from normal testing.
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!