QuestionQuestion

Transcribed TextTranscribed Text

Question 1 Which of the following statements are correct regarding security on Windows operating systems? (Check all that apply.) a. When a user account is assigned to a group, that user account inherits the permissions which are assigned to that group. b.A security descriptor is copied into each process executed by a user, and uniquely identifies both the user and the user's privileges. c. Windows-based security supports discretionary access control. d. Access tokens are associated to objects, and enable the object's owner to determine which users and groups are allowed to access the object. Question 2 5 points Save Answer Which of the following statements are correct regarding user accounts on UNIX based systems? (Check all that apply.) a. UNIX based systems support the ability to group user accounts, and to assign access control permissions to those groups. b. Passwords are located in the Vetc/shadow file on legacy UNIX systems, but have been relocated to the /etc/passwd file on modern UNIX systems, so that the entries are more secure. c. Only the superuser has the ability to decrypt a user account's password. d. The /etc/shadow file is only readable by the superuser. Question 3 The primary purpose of the Windows registry is to maintain ? a. A history of commands recently executed b. Valid networking port numbers C. Windows os and Windows applications' configuration data d.A. useful manual to help users Question 4 Which of the following correct regarding Windows processing of Access Control Lists (ACLs)? (Check all that apply.) a. DACL entries are checked against the SID of the process until a match is found or the end of the DACL is reached b. Windows SACL and DACL entries include Access Tokens c. If there is no DACL associated with the object then any process can access the object d. If the DACL associated with an object exists but does not contain any entries then access is granted Question 4 Which of the following correct regarding Windows processing of Access Control Lists (ACLs)? (Check all that apply.) a. DACL entries are checked against the SID of the process until a match is found or the end of the DACL is reached b. Windows SACL and DACL entries include Access Tokens c. If there is no DACL associated with the object then any process can access the object d. If the DACL associated with an object exists but does not contain any entries then access is granted Question 7 Select all statements that correctly describe IP Security (IPsec). (Check all that apply.) a. IPsec can only be used on networks running IPv6 b. IPSec makes use of symmetric (shared) keys for encryption. c. IPSec makes use of asymmetric encryption (public/private key encryption). d. IPsec can make use of tunneling, whereby one IP packet is placed into the payload of another IP packet. Question 8 Which of the following make access control decisions based upon application protocol message contents? (Check all that apply.) a. Application-Level Gateways b. Application Proxies c. Intrusion Prevention Systems (IPS) d. Stateful packet-filtering firewalls Question 9 Which of the following provide security for data link layer communications? (Check all that apply.) a. Deep Packet Inspection b.IEEE 802.1x c. IPSec d.IEEE 802.11i Question 10 5 points Save Answer Which of the following statements are correct regarding application-level gateways? (Check all that apply.) a. Application-leve gateways require additional processing overhead when compared to an application using a direct TCP connection. b. Application-level gateways usually filter application specific traffic. C. Application-level gateways are difficult to deploy, because in addition to acting as a standard IP firewall, they must monitor a host of specific application protocols. d. One common type of application-level gateway is an HTTP gateway. Question 12 Which of the following statements are correct regarding operating systems that include Role Based Access Control (RBAC)? (Check all that apply.) a. Role objects represent job functions to which user accounts are assigned. b. Windows operating systems provide RBAC c. Embedded (Real-time) operating systems provide RBAC. d. Most Linux systems provide RBAC through the kernel. Question 13 5 points Save Answer Which of the following statements is correct regarding Active Directory? (Choose all which are correct.) a. Active Directory primarily uses the NetBios protocol to group computers into domains. b. Active Directory supports the ability to use hierarchies of domains which all transitively trust each other. c. One goal of Active Directory is to allow each unit within an organization to manage their own user accounts. d. Active Directory is suitable for small or medium size organizations which have less than 1,000 users, but is unsuitable for larger organizations with more than 1,000 employees. Question 14 5 point Which of the following are considered IP packet authorization and access control architecture mechanisms used to protect networks? (Check all that apply.) a. NAT gateway b. Demilitarized Zones c. Screened single-homed bastion host systems d. Screened-subnet firewall systems Question 15 5 points Save Answer Select all statements that correctly describe network packet filtering at the IP layer. (Check all that apply.) a. Most IP Packet filtering firewalls determine what packets to filter based upon a set of rules which can be configured for a particular network or host. b. Most IP packet filtering firewalls determine what to filter based upon the IP header fields. c. IP packet filtering may either be applied to the perimeter of a network, or to individual hosts within a network, but it cannot be applied to both at the same time. d. IP packet filtering determines which IP packets may flow into or out of a network or a computer. Question 16 Which of the following statements are correct regarding access control on Linux operating systems? (Select all that are correct.) a. The root user has full control over the entire system. b. The setuid permission in Linux poses a potential security risk c. Users gain others' access privileges by executing the 'su' command. d. Even though Linux uses role-based access control, it still has a superuser account. Question 17 5 points Save Answer The IPsec Encapsulating Security Payload (ESP) security protocol protects different parts of the information transmitted by an element depending on whether transport or tunnel mode is used. Which of the following correctly identify those parts protected by ESP for the specified mode? (Check all that are true.) a. Transport Mode: the ESP header and the payload b. Tunnel Mode: all fields of the outer IP header, the ESP header, inner IP header and payload c. Tunnel Mode: the ESP header, the inner IP header and the payload d. Transport Mode: all fields in the IP header and payload Question 18 5 points Save Answer Which of the following information is used by a typical stateful packet-filtering firewall-router protecting a network from Internet connections? (Select/check all that apply.) a. Destination Ethernet address b. Source IP address c. Transport protocol port numbers d. Application protocol type e. Transport protocol type f. Destination IP address g. Source Ethernet address Question 19 Which of the following is only able to replicate itself by embedding itself in files or disk master boot blocks? a. Worm b. Trojan horse c. Virus d. Spyware Question 20 5 points Save Answer With IPv4, the IPsec Authentication Header (AH) security protocol protects different parts of the information transmitted by an element depending on whether transport or tunnel mode is used. Which of the following correctly identify those parts protected by AH for the specified mode with IPv4? (Check all that are correct) a. In tunnel mode, AH protects all fields of the AH header, the inner IP header, and the payload. b. In tunnel mode, AH protects all fields of the IP header, but not the payload. c. In tunnel mode, AH protects all fields in the outer IP header, the inner IP header, and the payload. d. In transport mode, AH protects the non-mutable fields in the IP header, the AH header, and the payload.

Solution PreviewSolution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.

1 - 1,3,4
2 - 1,3
3 - 3...

By purchasing this solution you'll be able to access the following files:
Solution.docx.

$100.00
for this solution

PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

Find A Tutor

View available GIS: Geographic Information Systems Tutors

Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Decision:
Upload a file
Continue without uploading

SUBMIT YOUR HOMEWORK
We couldn't find that subject.
Please select the best match from the list below.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Live Chats