Question

In: Computer Science

Question 22 What is the most common patch remediation frequency for most organizations? 1 point As...

Question 22

What is the most common patch remediation frequency for most organizations?

1 point

As soon as they are released.

Weekly

Monthly

Annually

23.

Question 23

In Windows kernel mode, what stops a misbehaving driver from impacting other processes?

1 point

The Windows Virtual Address Manager.

Each process runs in its own dedicated virtual address space.

The Windows Process Director.

Nothing.

24.

Question 24

In Linux, Bash, tcsh and sh are what?

1 point

Shells

Commands

Directories

Distros

25.

Question 25

Symmetric key encryption ensures which of the following?

1 point

Confidentiality only.

Confidentiality and Availability.

Confidentiality, Integrity and Availability.

Confidentiality and Integrity.

26.

Question 26

Which statement is True of Hash functions?

1 point

Hashing is a reliable way to assure the integrity of a message.

Using hashing is a good way to assure the confidentiality of the messages you send.

Hashes are becoming easier to reverse engineer since computers are becoming more powerful.

The length of the hash string is proportional to the length of the input so the approximate message length can be derived from a hash.

27.

Question 27

Which of the following statements about hashing is True?

1 point

The original message can be retrieved from the hash if you have the encryption key.

A weakness of hashing is that the hash is proportional in length to the original message.

Hashing uses algorithms that are known as “one-way” functions.

If you have two hashes that differ only by a single character, you can infer that the original messages also differed very little.

28.

Question 28

Which statement about encryption is True about data in use.

1 point

It is vulnerable to theft and should be decrypted only for the briefest possible time while it is being operated on.

Short of orchestrating a memory dump from a system crash, there is no practical way for malware to get at the data being processed, so dump logs are your only real concern.

Data in active memory registers are not at risk of being stolen.

Data should always be kept encrypted since modern CPUs are fully capable of operating directly on encrypted data.

29.

Question 29

For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?

1 point

Install a single firewall that is capable of conducting both stateless and stateful inspections.

You must install the stateful and stateless firewalls in parallel with an intelligent switch in front of them to direct the packets to one or the other as appropriate.

You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall.

Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.

30.

Question 30

Which statement best describes configuring a NAT router to use dynamic mapping?

1 point

The organization will need as many registered IP addresses as it has computers that need Internet access.

The NAT router uses each computer's IP address for both internal and external communication.

Unregistered IP addresses are mapped to registered IP addresses as they are needed.

Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.

31.

Question 31

If a computer needs to send a message to a system that is not part of the local network, where does it send the message?

1 point

The computer's IP address.

The computer's domain name.

The computer's MAC address.

The network's default gateway address.

The network's DNS server address.

The network's DHCP server address.

Solutions

Expert Solution

Q 22) Answer is as soon as they are released.

It depends upon the criticality of the system and impact of the patches.

For example,

Windows security patches should be installed immediately.

Antivirus patches should be installed weekly.

Database patches should be installed quarterly.

Q 23) Answer is Nothing

In kernel mode, all code runs in a shared single virtual address space. If a kernel-mode driver crashes, the entire operating system crashes. Nothing can stop.

In user mode, each process runs in its own dedicated virtual address space.

Q 24) Answer is Shells.

BASH, TCSH and SH are shells in linux where,

SH is referred to as shell.

BASH is referred to as "Bourne again shell"

TCSH is sometimes called as "C Shell" or "TC shell"(pronounced as tee-cee shell)

Q 25) Answer is Confidentiality only

Symmetric key encryption uses only a single key for encryption and decryption. It is a private key which is   shared by sender and receiver only. Confidentiality can be achieved this way.

Q 26) Answer is Hashing is a reliable way to assure the integrity of a message

A hash function is used to transform large random size data to small fixed size data. It does not need any key and works in one way manner.

One of the main purpose of hash function is providing integrity services via MAC (Message Authentication Code).

Q 27) Answer is Hashing uses algorithms that are known as “one-way” functions

A one-way hash function is a mathematical function that takes variable-length input string and converts it into fixed length binary sequence.

It is hard to reverse the process.

A good hash function makes it hard to find two strings that would produce the same hash value. A slight change in the input string would change the hash value drastically.


Related Solutions

Frequency Table Number of Years Frequency Number of Years Frequency 7 1 22 1 14 3...
Frequency Table Number of Years Frequency Number of Years Frequency 7 1 22 1 14 3 23 1 15 1 26 1 18 1 40 2 19 4 42 2 20 3 Give the 5-number summary of these data Using the answer from question a), make a box plot of these data. Make sure to use a numbered axis. Using a value width of 10, starting from 0 (e.g. 0 – 10), make a histogram of these data. Label your...
1. What is the most true regarding the chief risk officer (CRO) position? A. Most organizations...
1. What is the most true regarding the chief risk officer (CRO) position? A. Most organizations have a CRO. B. The CRO position is not very common as it can be absorbed easily in an organization. C. If there is not a designated CRO, the duties still exist. D. The CRO only handles hazard risks. 10. The group in an organization that is tasked with establishing effective internal controls to monitor risk is... A. Management. B. Board of directors. C....
1. What are the most important organizations that work on global health issues ? Choose one...
1. What are the most important organizations that work on global health issues ? Choose one of them and elaborate on the mission of that organization, its contributions and accomplishments as well as the challenges it needs to overcome. 2. How do you foresee these organizations working together to overcome the global challenges that COVID 19 has caused? Explain in no less than two paragraphs.
Questions 1. What are the most common triggers in people with asthma? 2. What are the...
Questions 1. What are the most common triggers in people with asthma? 2. What are the main differences between the green, yellow and red zones of an asthma action plan? 3. How is a spirometry test performed? 4. What is FEV1/FVC and how does it help diagnosis asthma? 5. Create a teaching plan to educate patients on how to manage symptoms when in the yellow zone and ways to prevent entering the yellow zone.
1. What are the 4 most common formations of Business? 2. What are the advantages and...
1. What are the 4 most common formations of Business? 2. What are the advantages and disadvantages of a Partnership? 3. What are the advantages and disadvatages of a C Corporation? 4. What are the advantages of a Franchise? 5. What are the disadvantages of a Franchise? 6. If you could start a business, what business would you start and what form would you take? Why?
Justify Why is the point method the most common form of job evaluation in Canada?
Justify Why is the point method the most common form of job evaluation in Canada?
1- What are the two most common cause of acute cholecyctitis? 2- Which etiology is most...
1- What are the two most common cause of acute cholecyctitis? 2- Which etiology is most likely causing acute cholecyctitis?
What is the most common cause of osteoarthritis?
What is the most common cause of osteoarthritis?
What are common network topologies of star, mesh, bus, ring, point to point, point to multipoint...
What are common network topologies of star, mesh, bus, ring, point to point, point to multipoint and hybrid?   What are advantages and disadvantages of each?   When are each used?
Please answer the below question in detail with great examples. In most organizations, HR is only...
Please answer the below question in detail with great examples. In most organizations, HR is only brought in for informative consultation after the strategic plan is constructed to ensure that the HR team will be able to provide the right number of people, in the right place, with the right training. Such a process is too little, too late and ignores the values which HR can provide to the strategic planning process. What values does HR provide to the strategic...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT