Course Hero Logo

Steve a scientist who works in a governmental

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 9 - 11 out of 34 pages.

35.Steve, a scientist who works in a governmental security agency,developed a technological solution to identify people based on walkingpatterns and implemented this approach to a physical control access.camera captures people walking and identifies the individuals using Steve'sapproach. After that, people must approximate their RFID badges. Both theidentifications are required to open the door. In this case, we can say:Aa.The solution implements the two authentication factors: physicalobject and physical characteristic
9
b.The solution will have a high level of false positivesc.Biological motion cannot be used to identify peopled.Although the approach has two phases, it actually implements just oneauthentication factor36.A network administrator discovers several unknown files in the rootdirectory of his Linux FTP server. One of the files is a tarball, two are shellscript files, and the third is a binary file is named "nc." The FTP server'saccess logs show that the anonymous user account logged in to the server,uploaded the files, and extracted the contents of the tarball and ran thescript using a function provided by the FTP server's software. The pscommand shows that the nc file is running as process, and the netstatcommand shows the nc process is listening on a network port. What kind ofvulnerability must be present to make this remote attack possible?
37.In an internal security audit, the white hat hacker gains control over auser account and attempts to acquire access to another account’sconfidential files and information; How can he achieve this?
38.Peter is surfing the internet looking for information about DXCompany. Which hacking process is Peter doing?

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 34 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
LindaS.Shore
Tags
IP address, Domain Name System, TCP and UDP port, Nmap

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture