logo

Crowdly

ICT379 Security Architectures and Systems Administration (tjd, 2025)

Шукаєте відповіді та рішення тестів для ICT379 Security Architectures and Systems Administration (tjd, 2025)? Перегляньте нашу велику колекцію перевірених відповідей для ICT379 Security Architectures and Systems Administration (tjd, 2025) в moodleprod.murdoch.edu.au.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

If it detects a threat, an IPS can ____.

0%
0%
0%
100%
Переглянути це питання

Which of the following options lists all the seven fields of the </etc/passwd> file in the correct order?

0%
0%
0%
100%
Переглянути це питання

This questions lead on from the lab activity but requires further research using https://httpd.apache.org/docs/2.4/

You are a server administrator in your organisation and responsible for the Ubuntu web server (your org really likes Ubuntu).  Auditing policies require that the following information is logged in the default Apache log file which is not typically logged with the default log file:

  • Size of response in bytes
  • Remote user if the request was authenticate
  • Contents of the cookie AUTHID in requests send to the server

To differentiate from the default log format, the modified format should be given the name: custom_combined

Your answer must contain the following things:

  1. Description where Apache logs information by default
  2. Explanation on how to customise the logging including names of config files, config directives required and explaining any processes required to change the configuration of the server

It is not required to actually implement this and any syntax errors will be ignore wrt marking, but your answer needs to contain actual configuration directives, file names and commands involved and not just vague explanations.

Переглянути це питання

Explain the concept of interposable libraries: what are they for, in which case can they applied, how do they work?

Переглянути це питання

As part of securing a web site you are tasked with developing a regular expression that can be used to validate flight ticket numbers as entered by users. The flight ticket numbers have the following format:

AA-NN[N][N]-YYYY-MM-DD-CCCCCC

The different fields are explained below:

  1. AA is a two character upper case airline code where each character can be from the whole alphabet (we won't need stricter checking here as in actually checking for valid 2-character airline codes)
  2. NN[N][N] is a flight number which is either 2, 3 or 4 digits long (note that the square brackets here indicate that the 3rd and 4th digits are optional and the square brackets are not part of the format)
  3. YYYY is the year, assume we accept all values between 2000 and 2099
  4. MM is the month, this is always specified as two digits (with leading 0 if necessary)
  5. DD is the day of the month specified as two digits (with leading 0 if necessary)
  6. CCCCCC is a 6 digit number

All these fields are separated by hyphens.

For the purpose of the exercise, you do not need to consider valid year/month/day combinations and you only need to check each in isolation. For example, 2021-09-31 is valid here. However, your solution must NOT explicitly list all the valid numbers for years, months or days.

You must explain your solution, but no more than one short sentence (or bullet point) for each of the fields.

Переглянути це питання

Explain the rationale for and the overall approach of the ring-based architecture implemented on Intel (and compatible) processors. 

Переглянути це питання

Explain the three core principles of the CIA triad and for each name at least one technique that can be used to maintain/implement the principle.

Переглянути це питання

Employing defence in depth increases the complexity of compromising computer systems. Describe the concept of defence in depth, and provide an example.

Переглянути це питання

Explain the principle of least privilege based on the example of Kali Linux which in 2020 abolished the principle of logging in and working as root by default. Your answer should explain the principle itself and wrt Kali Linux the issue and how it was solved.

Переглянути це питання

With regards to secure programming / software security, explain what fuzzing is, including making clear what its purpose is, and how fuzzing differs from normal testing.

Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на moodleprod.murdoch.edu.au?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!