Question

In: Computer Science

when performing a reverse engineering, which of the following file types would be most easily decompiled...

when performing a reverse engineering, which of the following file types would be most easily decompiled into source code?

A so

B exe

C jar

D a

A cybersecurity analyst is securing a server that will host an e-commerce web application. Which of the following factor would prevent the financial data from being transferred in clear text? (select two)

  1. Allow traffic to port 1433 and deny everything
  2. Set up the web server to use NULL cipher suite.
  3. Get a certificate from a reputable certificate authority
  4. Configure the web server to use the latest TLS protocol
  5. Configure the web server to use to use the latest SSH protocol
  6. Allow traffic to port 443 and deny everything

Solutions

Expert Solution

when performing a reverse engineering, which of the following file types would be most easily decompiled into source code?

A so

B exe

C jar <---- Correct Answer (since jar is just a kind of archive, check explanation)

D a

A cybersecurity analyst is securing a server that will host an e-commerce web application. Which of the following factor would prevent the financial data from being transferred in clear text? (select two)

  1. Allow traffic to port 1433 and deny everything
  2. Set up the web server to use NULL cipher suite.
  3. Get a certificate from a reputable certificate authority <---- Correct Answer
  4. Configure the web server to use the latest TLS protocol <---- Correct Answer
  5. Configure the web server to use to use the latest SSH protocol
  6. Allow traffic to port 443 and deny everything


Explanation:

"A JAR (Java ARchive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) ... JAR files are archive files that include a Java-specific manifest file. They are built on the ZIP formatand typically have a . jar file extension." Reference: https://en.wikipedia.org/wiki/JAR_(file_format)

The rest of file types are compiled and thus the reverse engineering process will be more complex.

In order to encrypt the traffic from/to a web server, the TLS protocol should be configured and enabled (to enable HTTPS). In order to do so, one needs to obtain a digital certificate (From a reputable Certificate Authority (CA) in order to being trusted in most web browsers and configure the web server to use the latest TLS protocol (in order to avoid bugs and vulnerabilities in old versions)


Related Solutions

what signs would the. urse most likely notice when performing a respiratory assessment
what signs would the. urse most likely notice when performing a respiratory assessment
1. (a) Which of the following types of biomolecules would most likely be found embedded in...
1. (a) Which of the following types of biomolecules would most likely be found embedded in a phospholipid bilayer?
Which types of companies would most likely use a process costing system and which types of...
Which types of companies would most likely use a process costing system and which types of companies would use job costing? Provide examples of two Saudi Companies. Explain the methods with which the cost per unit will be calculated for each type of company using numerical example
4 Which types of companies would most likely use a process costing system and which types...
4 Which types of companies would most likely use a process costing system and which types of companies would use job costing? Provide examples of two Saudi Companies. Explain the methods with which the cost per unit will be calculated for each type of company using numerical example. please company must be in Saudi Arabia
When quantifying the lack of marketability discount, which of the following types of data would result...
When quantifying the lack of marketability discount, which of the following types of data would result in a marketability discount that is understated? Select one: a. Restricted stock grants. b. IPOs. c. Put options.
Which of the following would be most detrimental for cellular respiration? That is, which one would...
Which of the following would be most detrimental for cellular respiration? That is, which one would result in the greatest reduction in the number of ATP molecules being generated? Select one: a. A strong reducing agent which is only active in the inter-membrane space of mitochondria b. A strong oxidizing agent which is only active in the mitochondrial matrix c. A strong reducing agent which can enter the cytoplasm but not the mitochondrial matrix d. A strong oxidizing agent which...
Which types of companies would most likely use a process costing system?
Which types of companies would most likely use a process costing system? Provide examples of two Saudi Compagnies.Explain the methods with which the cost per unit will be calculated for this type of companies. Explain how the different items of inventory will be evaluated?
The three variables which are most easily changed in Gas Chromatography are the Carrier gas Flow...
The three variables which are most easily changed in Gas Chromatography are the Carrier gas Flow Rate, the Temperature of the Column, and the Polarity of the Column. How might each of these effect the appearance of your GC trace?
In which ways is gluconeogenesis the reverse of glycolysis. Which of the following IS NOT TRUE?
In which ways is gluconeogenesis the reverse of glycolysis. Which of the following IS NOT TRUE? A) gluconeogenesis uses most glycolysis reactions in reverse mode. The direction of the reaction is determined by the concentration of reagents and products in the pathway. B) phosphoenolpyruvate and pyruvate interconversions directed by pyruvate carboxylase/PEP-carboxykinase AND pyruvate kinase are the first steps that commit the onset of gluconeogenesis C) fructose-16P and fructose-6P interconversions directed by fructose 1-6 bisphosphatase AND phosphofructokinase is the first step that determine the...
Put the following events in the order in which you do them when performing P element...
Put the following events in the order in which you do them when performing P element transformation. 1. Cross injected flied individually with w/w flies of opposite sex 2. Clone a trans gene into a recombinant P element vector containing a white + marker gene 3. Cross red-eyed siblings to each other to generate transgenic lines, each with the recombinant P element in a different genomic location 4. Screen progeny of injected flies for red eyes 5. Inject w/w embryos...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT