Fill This Form To Receive Instant Help
Homework answers / question archive / Question 1 Answer any two (2) of the following questions
Question 1
Answer any two (2) of the following questions. Provide enough detail to earn 6 marks for each. If you answer more than 2, only the first 2 will be marked. Use proper sentences, grammar and spelling. Each question is worth 6 marks.
|
Plan Protect and Respond is the management’s security responsibility. What is management’s main function under Planning?
|
Comprehensive Policies |
|
|
Defence in Depth |
|
|
None of the above |
|
|
Risk Analysis |
How collision can be detected in CSMA/CD?
|
Detecting power level on the wire |
|
|
Detecting frequancy on the wire |
|
|
Detecting phases on the wire |
|
|
None of them |
A technique used by hackers which does not use any technology is which of the following?
|
Cross Site Scripting |
|
|
SQL injection |
|
|
Social Engineering |
|
|
Denial of Service |
A modern technology that makes routers work like switches to make very fast routing decisions is which of the following?
|
IEEE 802.3ae |
|
|
IPv4/v6 |
|
|
MPLS |
|
|
IPv6 |
"The router received a packet, and it decapsulated to layer 3. After finding the destination host IPv4 address, the router needed to find the network address of the host address and the best path to the destination. What is the process? "
|
Anding the IPv4 address with network mask to find network address then check the routing table for the best path to the network address of the destination. |
|
|
Anding the IPv4 address with a default gateway to find network address then check the routing table for the best path to the network address of the destination. |
|
|
Anding the IPv4 address with Network mask to find network address then check mac address table for the best path to the network address of the destination. |
|
|
Anding the IPv4 address with Network mask to find network address then use switch for forwarding the packet to the destination. |
What is the biggest danger of the smart home?
|
hacking IoT devices to get personal information |
|
|
misconfigured devices that cause household fires |
|
|
robots that kill the homeowners |
|
|
None of the above |
Which of the following is a programming language for building IoT applications?
|
C/C++ |
|
|
Java |
|
|
C# |
|
|
All of the above |
How collision can be detected in CSMA/CD?
|
Detecting voltage level on the wire |
|
|
Detecting frequancy on the wire |
|
|
Detecting phases on the wire |
|
|
None of them |
Which of the following is NOT a programming language for building IoT applications?
|
JavaScript |
|
|
B# |
|
|
Swift |
|
|
Azure |
A popular tool which uses the same techniques a hacker uses to find vulnerabilities and design weaknesses in an application software is:
|
Codebrag |
|
|
VeraCode |
|
|
Checkmarx |
|
|
Metasploit |
Answer any five (5) of the following acronyms, in the space provided. Write the full words of the acronym. For full marks, the words must be spelled correctly (0.25 mark). Then, in one sentence, describe the function\ purpose or description of the acronym. (0.75 mark)
VPN |
EAP |
RADIUS |
WEP |
MITM |
VoIP |
IFS |
Review the diagram below and answer the following questions. Computer T is sending a message to server Z. Write your answer in the table below.
How many physical links does the message travel? |
Blank 1 |
How many data links does the diagram have? |
Blank 2 |
How many routes does the message travel? |
Blank 3 |
In the secure database access, secure communication must be enough to have secure access.
True
False
A robot must protect its own existence as long as such protection conflict with the First or Second Laws
True
False
In SDLC, the management never releases the application “as is” to control costs.
True
False
The AllSeen standard for interconnecting IoT devices is________________.
A tool designed to take the advantage of a known weakness is called an _____________.
Multiplying the value of an asset by the probability of loss is used to calculate ___________________ .
The _________protocol is designed to prevent unauthorized access to a data port.
Already member? Sign In