Explore BrainMass
Share

Information Security (6 multiple choice) questions

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Is there anyone that can help me be better understand the 6 multiple choice questions that are attached. Please help if you can. I feel that 5 credits for these questions is a very reasonable compensation for the review.

There are 6 multiple choice questions which I have answered. I am requesting someone with knowledge in Information Security to review and provide some explanation if your answers are different?

© BrainMass Inc. brainmass.com October 24, 2018, 8:05 pm ad1c9bdddf
https://brainmass.com/computer-science/data-clustering/information-security-6-multiple-choice-questions-87743

Attachments

Solution Preview

I have tried to answer the questions and give explanations wherever required.

1. Which best describes how malicious code can get on your computer?

a. Email attachments

b. Downloaded software from non-authoritative sources and websites

c. Sharing diskettes from computers without up to date antivirus software

d. All of the above

e. A and C only

My guess is "all of the above". You are correct.

2. A way of verifying a message's integrity after transport across a network is through the use of:

a. A Message Authentication Code

b. Steganography

c. An encryption key

d. A cipher

My Guess is an encryption key as this appears to be the safest way to transmit a message.
You are incorrect.
a. is the right choice.
A Message Authentication Code is a one-way hash ...

$2.19
See Also This Related BrainMass Solution

Network security questions

There are eight network security questions. I have answered the questions however, I am unclear if I am correct. Please review and if I am wrong, please provide the correct answer along with your explanation.

1. Which of the following pieces of information can be found in the IP header?

a. Source address of the IP packet
b. Destination address for the IP packet
c. Sequence number of the IP packet
d. Both (A) and (B) only.

My answer is d.

2. We also don't want our undeliverable packets to hop around forever. What feature/flag limits the life of an IP packet on the network?

a. Time to Live counter
b. Subnet Mask
c. Header Checksum
d. Wackamole field

My answer is a.

3. I bank online. Which of the following are application-level encryption protocols that I would most likely use to securely bank online?

a. SSL and SET
b. Verisign and SHA1
c. READY, SET, and GO
d. PGP, PEM, and SSL

My answer is a.

4. We don't want our packets to get lost in transit. Which OSI layer is responsible for ordered delivery of packets?

a. Network
b. Link
c. Transport
d. Physical

my answer is b but I am not sure

5. When my teleconference data packets reach the destination computer, what information in the packet is used by the destination computer to figure out that the packets belong to the teleconferencing application?

a. Firewall rules
b. Port numbers in the TCP/UDP header
c. Three-way handshake initiated at the start of the communication.
d. IANA subnet class number in the first octet of the IP address

my answer would be c...but this is a far guess for me.

6. I want to request secure web pages using https://. What port will I need to open on my firewall to allow these SSL-encrypted packets to flow?

a. 161
b. 53
c. 6000
d. 443
e. 137

I thought for web pages uses port 80...

7. Based on what we have learned about TCP and UDP packet accounting mechanisms, which transport control protocol would I most likely use for Internet Telephony/Teleconferencing (Voice over IP)?

a. UDP - Because I don't want to retransmit if some of the packets get lost.
b. UDP - Because I want to make sure that no packets get lost.
c. TCP - Because I don't want to retransmit if some of the packets get lost.
d. TCP - Because I want to retransmit lost voice IP packets later on in the conversation.

I am not sure what they are asking

8. What is the standard IANA port number used for requesting web pages?

a. 80
b. 53
c. 21
d. 25

My answer is a.

View Full Posting Details