A ftp b mime c pop3 d telnet 15 q34 in a tcpip

Info icon This preview shows pages 13–17. Sign up to view the full content.

View Full Document Right Arrow Icon
a) FTP b) MIME c) POP3 d) TELNET 15
Image of page 13

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Q34. In a TCP/IP network using IPv4 addresses, which of the following is a valid network address? Here, the number following a slash (/) is the number (in decimal) of bits allocated to represent the network number. a) 123.0.0.30/27 b) 150.60.0.130/25 c) 196.74.38.20/28 d) 210.11.190.192/26 Q35. Which of the following is the effect that is expected by duplexing a server configuration, as shown in the figure below? Even when server 1 stops, the service continues by switching to server 2. Original configuration Duplex configuration The Internet The Internet Server (running) Alive monitoring Data Data Server 1 (running) Server 2 (standby) a) Improvement in accountability b) Improvement in availability c) Improvement in confidentiality d) Improvement in integrity Q36. When Mr. A sends Mr. B an e-mail with a digital signature created by using public key cryptography, which of the following is the appropriate combination of the keys that are used by Mr. A and Mr. B ? Key that Mr. A uses to create digital signature Key that Mr. B uses to verify digital signature a) Mr. A ’s private Key Mr. A ’s public Key b) Mr. A ’s public Key Mr. A ’s private Key c) Mr. B ’s private Key Mr. B ’s public Key d) Mr. B ’s public Key Mr. B ’s private Key 16
Image of page 14
Q37. When security attacks to a computer system are classified into three categories (i.e., reconnaissance attack, access attack, and DoS attack), which of the following is classified as a reconnaissance attack? a) Attempting to discover and map out systems, services, or vulnerabilities b) Compromising the availability of a network, host, or application c) Exploiting known vulnerabilities in authentication services or other Web services d) Sending an extremely large number of requests over a network or the Internet Q38. Which of the following is an appropriate explanation concerning the security attack that is classified as DNS cache poisoning? a) In order to block the service that is an attack target, an attacker sends a large number of recursive queries by using the DNS server as a stepping stone. b) In order to obtain internal information, the zone information stored in the DNS server is transferred all at once. c) Incorrect domain information is injected into the DNS server referenced by a PC, which leads the PC user to a fake Web server. d) The version information of the software used by a DNS server is obtained to identify a security hole in the DNS server. Q39. Which of the following is a method for preventing an SQL injection attack? a) Ensuring that the input characters are not interpreted as characters that have a special meaning in an inquiry or operation to the database b) Rejecting an input text if the overall length of the input text exceeds the applicable maximum size limit c) Rejecting an input text that contains the character string ( . . / ) that specifies a higher level directory d) Replacing the HTML tags of an input text with other character strings that are not interpreted as HTML tags 17
Image of page 15

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Q40.
Image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern