Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

PE B: True/False 1. A logic bomb is the event or condition that detere pcien 2.

ID: 3706918 • Letter: P

Question

PE B: True/False 1. A logic bomb is the event or condition that detere pcien 2. Signature-based (IDS) approaches temo 3. A common location for a NIDS sensor is just inside the 4. The firewall may be a single computer system or a set of wo or 5. 6. 7. when the peylond is activaned or anomaly (IDS) approaches attempt to define proper behuavicr ne sormal, or expected elarior, wh more systems that cs perform the firewall function. Security flaws occur consequence codes in programs. Cross-site scripting attacks attempt to bypass access privileges to sensitive data belonging to another site. Physical security must also prevent any type logical security. as a consequence of sufficient checking and validation of data the browser's security checks to gain of physical access or intrusion that o 8. A keystroke logger is software or a hardware device that could be used to moni 9. All Trojans have the same purpose: to destroy the data on the systenm 10. Rootkits can be used to give the attacker a backdoor access to the system user key strokes 11. Denial-of-service attacks target the confidentiality and integrity of a system o 12. Standard web servers run on ports 80 or 443 13. Many computer security vulnerabilities result from poor programming pract 14. A packet filtering firewall is typically configured to filter packets goin 5. In a virus attack, the victim machine is the source.

Explanation / Answer

1)Answer:

True

Explanation:

A logic bomb is the event or condition that determines when the payload is activated or delivered.

2)Answer:

False

Explanation:

Statistical approaches attempt to define normal, or expected,behavior, whereas rule-based approaches attempt to define proper behavior.

3)Answer:

True

Explanation:

A common location for a NIDS sensor is just inside the external firewall.

4)Answer:

True

Explanation:

The firewall may be a single computer system or a set of two or more systemsthat cooperate to perform the firewall function. The firewall, then, provides an additional layer of defense, insulating the inter- nal systems from external networks.

5)Answer:

false

6)Answer:

True

Explanation:

Crosssite scripting attacks attempt to bypass the browser’s securitychecks to gain elevated access privileges to sensitive data belonging to another site

7)Answer:

True

Explanation:

Physical security must also prevent any type of physical access or intrusion that can compromise logical security

8)Answer:

True

Explanation:

keystroke loggers.monitor and record keystrokes and can be software or hardware devices

9)Answer: