Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Security fundamentals( Computer Science major) multiple choice question.

ID: 3591832 • Letter: N

Question


Network Security fundamentals( Computer Science major)
multiple choice question. posting more soon.

CST 3610- Network Security Fundamentals Midterm Exam October 22, 2014 Computer Systems Technology Department is protocol layer is used to support special encryption such as 55t and SFTP traffic onhy 23. What best describes the name and function of ICMP packet and ICMP packet is defined at A. Internet physical layer Control Mode Protocol, it is used to get the server network status, it is defined in Internet Central Messaging Protocol, i used to translate IP to MAC address and i defined at the TCP Layer C. Internet Control Message Protocol, it is used to get the network layer status, it is defined in IP D. Internet Centralized Message Protocol, it used to translate IP into iP SEC, and it defined at the E. All of the above. 24. What are the three basic steps of reconnaissance in sequential order? A. Footprinting, Data Collection and Target 8. Network Enumeration, Host Collection and Hacking C. Data Collection, Ping and Traceroute D. DNS lookup, Ping and Targeting . None of the above of expectations does it define for A AUP defines all the firewall and router policies / guidelines for the network management 8. An AUP defines the systems to be used for business purposes that serve the interests 25. What is the role of an Acceptable Use Policy and what type o C AUP defines policies and guidelines users should follow in the corporate D. An AUP defines the systems enforcement policies for network penetration . . usage in the regarding the type of corporate information that can be shared on social media site E. An AUP defines corporate enforcement policies for the types of websites that IT users o calling organization and tricking them into giving out critical information Active Reconnaissance is process used by hackers to search an organization garbage to collect private which has not been shredded 26. What is the objective of "Active Reconnaissance"? A. Active Reconnaissance is the act of hackers utilizing tradition techniques such as randomly Active Reconnaissance is process of utilizing chats to convince users to share personal information which could be later used to hack site B. C.

Explanation / Answer

Ans 23 Option (C) Internet Control Message Protocol

Ans 24 Option (B) Network Enumeration, Host Collection & hacking

Ans 25 Option (E)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote