APU ISSC457 Week 1 And 2 Quiz Latest 2020

Question

Dot Image

ISSC457 I001 Sum 18       Tests & Quizzes

Question 1          Network Forensics is the capturing, recording and analysis of network events in order to discover the source of security attacks.                                                                                                                                                                                          

Question 2          Enumeration is the process of gathering information about a network that may help an intruder attack the network.                                                                                                                                                                                                                            

Question 3          A  virus is a software program written to change the behavior of a computer or other device on a network, without the permission or knowledge of the user.                                                                                                                          

Question 4          Trojans are programs that contain or install malicious programs on targeted systems.                                     

Question 5          Intrusion detection is the process of tracking unauthorized activity using techniq es s ch as inspecting user actions, security logs, or audit study data.                                                                                                                                                            

Question 6          IIS Centralized : binary logging is a proce  in which many Web s tes write binary and unformatted log data to a single log file.                                                                

Question 7 Accountability  Log data identifies the accounts that are associated with certain events.                                         

Question 8          Reconstruction : Investigators review log data in order of time to determine what happened before and during an event.                                              

Question 9          Syslog is a combined audit mechanism used by the Linux operating system.                                                        

Question 10        Process Accounting is an audit mechanism for the Linux operating system.                                                          

Question 11        Cross-site scripting : (XSS) is an application-layer hacking method used for hacking Web applications.     

Question 12        Parameter Tampering is a type of Web attack that occurs when an attacker changes or modifies the parameters of a URL.                                                                    

Question 13        Cookie Snooping is when an attacker steals a victim’s cookies, possibly using a local proxy, and uses them to log on as the victim.                                                                                                                                       

Question 14        The DMZ (    demilitarized zone ) is a semitrusted network zone that separates the untrusted Internet from the company’s trusted internal network.com was                                                           

Question 15        Zero-day attacks exploit previously unknown vulnerabilities, so they are especially dangerous because preventative measures  ann t be taken in advance.                                                                                                                                        

Question 16        A URL    Interpretation attack is when an attacker takes advantage of different methods of text encoding, abusing the interpretation of a URL.                                       

Question 17        An    Impersonation attack is when an attacker spoofs Web applications by pretending to be a legitimate user.study                                                                                                         

Question 18        WebLog Expert gives information about a site’s visitors, including activity statistics, accessed files, paths through the site, referring pages,via search engines, browsers, operating sys ems, and more.                                                                                                   

Question 19 N-Stealth is a vulnerability-assessment product that scans Web servers to identify security problems and weaknesses.                                     

Question 20  Intrusion Detection (IDS) is a tec nique t     at detects inappropriate, incorrect, or anomalous activity in a system or network.

                                                                                                               

 

 

 

 

 

 

Having Trouble Meeting Your Deadline?

Get your assignment on APU ISSC457 Week 1 And 2 Quiz Latest 2020 completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts