Question: Part B - Short Answer - Questions 31 to 36 [30 marks] Choose Six (6) of the following TEN (10) questions to answer. Each question

Part B - Short Answer - Questions 31 to 36 [30 marks]

Choose Six (6) of the following TEN (10) questions to answer. Each question is worth 5 marks. Questions should be answered in 4-8 sentences or using dot points as appropriate.

Question 31

What is Session Hijacking? What actions can the attacker perform once successfully hijacked?

Question 32

Briefly describe ARP poisoning and DNS cache poisoning. Explain with an illustration how an ARP poisoning takes place.

Question 33

Explain reversible and irreversible encipherment mechanisms.

Question 34

Explain what honeypots are. Explain the advantages of two locations that honeypot can be placed in a network.

Question 35

What is a broadcast storm? How can you prevent it from happening?

Question 36

Could you explain the process of brute-force attack?

Question 37

Explain what is a message digest? Quote examples for the use of message digest in real-world scenarios.

Question 38

Explain what public-key infrastructure is.

Question 39

Explain the difference between tunnel and transport mode functionality in IPSEC.

Question 40

What is the difference between random and pseudorandom numbers in algorithms based on cryptography?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!