Question 1 Q.1.1 Using an example for each of the different types of social engineering approaches,...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Question 1 Q.1.1 Using an example for each of the different types of social engineering approaches, explain what is and how each can be implemented in a tertiary college academic and record keeping environment. Q.1.2 Q.1.3 Q.1.4 A. Impersonation. B. Phishing. C. Spam. D. Hoaxes. Describe one example of each of the following cybersecurity vulnerabilities: A. Platforms vulnerabilities. B. Configurations vulnerabilities. C. Third parties vulnerabilities. D. Patches vulnerabilities E. Zero-day vulnerabilities. Using suitable examples, differentiate between the launch and evade actions of malware. Your answer must give the types of malware as examples and use the examples to show the difference between the two actions. Study the comparison of RADIUS and TACACS below and answer the question that follows: Column A Feature A. Transport protocol B. Authentication and authorisation C. Communication Column B RADIUS User Datagram Protocol (UDP) Combined Unencrypted (Marks: 30) Column C TACACS+ Transmission Control Protocol (TCP) Separate Encrypted (8) (5) (8) (9) Question 2 Q.2.1 Q.2.2 Q.2.3 Using appropriate examples for each feature (A-C) in column A above, explain the differences between RADIUS and TACACS+ authentication services using the descriptions in column B and column C. Q.2.4 (Marks: 30) Using suitable examples, differentiate between the Domain Name System (DNS) (8) and Layer 2 network attacks. Your answer must give types of network attacks as examples and use the examples to show the difference between the interception and Layer 2 attacks. Give an example of how each of the following Operating System (OS) tools for security assessment and defense: A. tracert. B. nslookup. C. ipconfig. D. ping. E. netstat F. pathping. G. netstat. H. pathping. I. route. J. curl. Describe the use of each of the following network segmentation design technologies to secure networks using examples. A. Zero trust. B. Virtual LANs (VLANs). C. Demilitarized zone (DMZ). Discuss the importance of configuration management in the context of security. In your answer, give examples of tools that can be used in configuration management. (10) (6) (6) Question 1 Q.1.1 Using an example for each of the different types of social engineering approaches, explain what is and how each can be implemented in a tertiary college academic and record keeping environment. Q.1.2 Q.1.3 Q.1.4 A. Impersonation. B. Phishing. C. Spam. D. Hoaxes. Describe one example of each of the following cybersecurity vulnerabilities: A. Platforms vulnerabilities. B. Configurations vulnerabilities. C. Third parties vulnerabilities. D. Patches vulnerabilities E. Zero-day vulnerabilities. Using suitable examples, differentiate between the launch and evade actions of malware. Your answer must give the types of malware as examples and use the examples to show the difference between the two actions. Study the comparison of RADIUS and TACACS below and answer the question that follows: Column A Feature A. Transport protocol B. Authentication and authorisation C. Communication Column B RADIUS User Datagram Protocol (UDP) Combined Unencrypted (Marks: 30) Column C TACACS+ Transmission Control Protocol (TCP) Separate Encrypted (8) (5) (8) (9) Question 2 Q.2.1 Q.2.2 Q.2.3 Using appropriate examples for each feature (A-C) in column A above, explain the differences between RADIUS and TACACS+ authentication services using the descriptions in column B and column C. Q.2.4 (Marks: 30) Using suitable examples, differentiate between the Domain Name System (DNS) (8) and Layer 2 network attacks. Your answer must give types of network attacks as examples and use the examples to show the difference between the interception and Layer 2 attacks. Give an example of how each of the following Operating System (OS) tools for security assessment and defense: A. tracert. B. nslookup. C. ipconfig. D. ping. E. netstat F. pathping. G. netstat. H. pathping. I. route. J. curl. Describe the use of each of the following network segmentation design technologies to secure networks using examples. A. Zero trust. B. Virtual LANs (VLANs). C. Demilitarized zone (DMZ). Discuss the importance of configuration management in the context of security. In your answer, give examples of tools that can be used in configuration management. (10) (6) (6)
Expert Answer:
Answer rating: 100% (QA)
Based on the image provided here are the answers to the questions Q11 Social Engineering in an Academic Environment A Impersonation An attacker could pretend to be a member of the IT staff claiming th... View the full answer
Related Book For
Microeconomics An Intuitive Approach with Calculus
ISBN: 978-0538453257
1st edition
Authors: Thomas Nechyba
Posted Date:
Students also viewed these programming questions
-
Ramesh Oil Mills, Bombay, consigned 40,000 kg of castor oil in 10 kg tins to B N Chatterjee, Calcutta, on 1st April, 2017. The cost of oil was Rs. 2 per kg. The consignors paid ~ 10,000 as freight...
-
X Use The Following Image For The Questions Below. 1) What Is The FW(7%) (At The End Of Period 8) Of The Given Cash-Flow Stream? 2) What Is The IRR Of The Given Cash-Flow Stream (To The Nearest 1)...
-
What does the check mark in the "Post" reference column of any special journal refer to? Discuss about the Post reference column.
-
1. Explain the Theories of leadership 2. Research -In modern times give 1 example as to which business leader in the hospitality industry has made a mark and why.?
-
Determine the centroid y' for the beams cross-sectional area; then find Ix'. Given: a = 25 mm b = 100 mm c = 25 mm d = 50 mm e = 75 mm
-
What types of federal taxes can be managed through the Electronic Federal Tax Payment System (EFTPS)? Explain briefly
-
Consider a stock price \(S\) governed by the geometric Brownian motion process (a) Using \(\Delta t=1 / 12\) and \(S(0)=1\), simulate several (i.e., many) years of this process using either method,...
-
XYZ is a calendar-year corporation that began business on January 1, 2015. For 2015, it reported the following information in its current year audited income statement. Notes with important tax...
-
The balance sheets for Monitor World Corporation and additional information are provided below. MONITOR WORLD CORPORATION Balance Sheets December 3 1 , 2 0 2 4 and 2 0 2 3 2 0 2 4 2 0 2 3 Assets...
-
1:- As a result of MEXIT, Telford Engineering had lost 30% of its pre-MEXIT export sales to CETA customers, due to increased trade and tariff barriers with CETA. (See P/L account before MEXIT in the...
-
Production of ethanol, made from corn, is on the rise. Some states are even requiring that ethanol be blended in small amounts with gasoline to reduce pollution. The problem is that there is not...
-
The Dotson Company, owner of Bleacher Mall, charges Rich Clothing Store a rental fee of \($600\) per month plus 5% of yearly profits over \($500\),000. Matt Rich, the owner of the store, directs his...
-
For 2015, Benjamin Inc. computed its annual postretirement expense as 240,900. Benjamins contribution to the plan during 2015 was 160,000. Prepare Benjamins 2015 entry to record postretirement...
-
Comparative Analysis Case adidas and Puma The financial statements of adidas (DEU) and Puma (DEU) are presented in Appendices B and C, respectively. The complete annual reports, including the notes...
-
Tevez Company experienced an actuarial loss of 750 in its defined benefit plan in 2015. For 2015, Tevezs revenues are 125,000, and expenses (excluding pension expense of 14,000) are 85,000. Prepare...
-
If the bonds in Question 6 are classified as trading and they have a fair value at December 31, 2015, of 3,604,000, prepare the journal entry (if any) at December 31, 2015, to record this transaction.
-
The excess of current assets over current liabilities isreferred to as working capital. a) True b) False
-
Give an example of transitory income. What effect does this income have on the marginal propensity to consume?
-
The following is intended to explore what kinds of own-price demand relationships are logically possible in a two-good model with exogenous income (unless otherwise specified). A: For each of the...
-
Suppose you are asked to model the savings decisions of a household that has an income of $100,000 this year but expects to have no income a period into the future. A. Suppose the interest rate is...
-
We will now re-consider the problem from exercise 12.5 but will focus on the two-step optimization method that starts with cost minimization. A: Suppose again that you face a production process such...
-
Few things are more irritating than a dripping tap. Taps drip because the rubber washer is worn or the brass seat is pitted by corrosion, or both. Ceramics have good wear resistance, and they have...
-
Polyethylene bottles are used to contain fluids as various as milk and engine oil. A typical polyethylene bottle weighs about 30 grams and has a wall thickness of about \(0.8 \mathrm{~mm}\). The...
-
As weight-saving assumes greater importance in automobile design, the replacement of steel parts with polymer-composite substitutes becomes increasingly attractive. Weight can be saved by replacing a...
Study smarter with the SolutionInn App