_7. It is a type of malicious code that activates at a specific time/date. 8. A_happens when input given to an application exceeds the allotted buffer memory. _9. True or False. Race condition can be solved using IDS. _10. A hidden computer mechanism installed by an intruder to gain access to the computer without being blocked by security mechanisms. A. Zombie B. Trap Door C. Trojan Horse
Q: send many requests to multiple servers with spoofed source, response can flood target and the…
A: DDoS attacks come from multiple locations, often spoofed. DDos is accomplished by flooding the…
Q: Configure Snort to log suspicious activity on the Untrusted and DMZ interfaces.
A: As per the company guidelines we are suppose to give answer only for one question. please repost…
Q: Which of the following settings should Kesha modify to solve this problem?
A: The settings should kesha modify to solve given problem
Q: A. It is considered best practice to confine cookies to those folders and subfolders on the web…
A: A. Cookies are linked to particular website domains and folders inside those domains, just as web…
Q: Percy is configuring Advanced Audit Policy settings for Windows 10 clients in his organization.…
A: Lets discuss the solution in the next steps
Q: Which of the following statements about user authentication and security issues is correct? Please…
A: - The question wants to know which statements among the following given are correct about user…
Q: If you get a free USB flash drive at an event, what attack vector could it have?
A: A USB flash drive is a data storage unit with flash memory and a USB interface built in. It's…
Q: Which of the following is correct about passive attack? a. Involve modification of the data stream O…
A: Passive Attacks are in the nature of eavesdropping on or monitoring of transmission.
Q: 21) In a pharming attack, the goal of the criminal is to _____. A. steal a victim's email…
A: Answering first question as per the guidelines. The problem is based on the basics of attacks in…
Q: 5. Which of the following application is not one of the public key encryption categories? a. Digital…
A: Cryptography: Cryptography is the process of securing a message or information by encrypting it…
Q: A user downloaded a program from a website. After saving the file, the user cannot find the…
A: A user downloaded a program from the website. After saving the file , the user cannot file…
Q: Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files…
A: We need to find the correct answer for the given question. Here sheron wants to recover his old…
Q: On servers with Linux operating system, access logs are kept under which of the following…
A: As per our policy, "Since you have asked multiple questions, we will solve the first question for…
Q: Hash
A: Given :- A password system that initially consists of password in the form of plain text Need to…
Q: Which of the following remote assistance tools are Ezekiel and Welma most likely using? a. Remote…
A: Welma is facing a issue when trying to save a file. Welma is not being able to resolve the issue…
Q: c. Which of the following statements is correct? (a) There are simple countermeasures for botnets…
A: Spyware is malicious software that collects details about a client or organization and sends them to…
Q: Which of the following does NOT describe a defense that a user can take to protect themselves from a…
A: Multiple browsers helps from the CSRF attacks and segregating will also help from trusting the…
Q: e've received an alert about a Brute Force attempt on this user. Based on the Windows Event Log…
A: Answer is given below. Account name: Sargento.Aquino. The system is this user attempting to…
Q: Suppose the cloud server installed a firewall that can detect virus A, Custom C installed a…
A: The correct answer is provided below:
Q: Which of the following best describes the principle of least privilege? A. Allow the user to have…
A: 1. D. Allow the user access to only what IS essential tor their job responsibilities 2. A. The…
Q: A web application that mistakenly allows users to submit special characters through an account…
A: Answer: b
Q: Jin enabled Personal Vault on OneDrive and added some important documents to the vault. To prevent…
A: We need to find that if Jin disabled his Personal vault in OneDrive, then in this case what will…
Q: Which of the following defence mechanisms should be implemented to prevent users from gaining…
A: Answer: d. Enforce proper firewall roles and configurations.
Q: information was taken. Upon further investigation that the server has now two admins, Precious and…
A: c) It is possible that precious is the real imposter and Teeh Mang is the real admin
Q: which type of cloud security vulnerability is static application security fasting (SAST) likely to…
A: The solution for the above given question is given below:
Q: $script = $_GET["script"]; eval("/$script;");
A: Given: $script = $_GET["script"];eval("/$script;"); We need to chose the answer: Which of the…
Q: Which one of the following is a key function of firewall? a) Monitoring b) Deleting c) Copying d)…
A: key function of firewall is monitoring. A firewall is a network security system that monitors and…
Q: Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of…
A: a) A cookie is a piece of code that has the potential to compromise the security of an internet…
Q: Which of the following is not used to secure a desktop computer?
A: Computer security basically is the protection of computer systems and information from harm, theft…
Q: Which of the following is not true regarding a honeypot? a. It is typically located in an area with…
A: To be determine: Select right option
Q: Which of the following are the vulenerabilties/threats.
A: Which of the following are the vulenerabilties/threats.Select one:a. All of theseb. Trojan Horsec.…
Q: Which of the following best exemplifies the use of multifactor authentication to protect an online…
A: Correct option: C
Q: 324. What is responsible for creating a process from a program? a. OS b. Web c. Internet d. Firewall
A: The operating system portion is answerable for making an interaction, stacking a program, and…
Q: Which of the following events demonstrates an example of cross-site request forgery vulnerability? O…
A: Vulnerabilities refer to the weak points that provide chances to attackers to enter into the…
Q: A company created an external application for its customers. A security researcher now reports that…
A: A company created an external application for its customer but by using it , A security researcher…
Q: 6) _________ attacks include impersonating another user, altering messages in transit between client…
A: Active attacks include impersonating another user, altering messages in transit between client and…
Q: In the field of cybersecurity, the main purpose of access control is to? a. Allow full access to…
A: a. Allow full access to authorized users. Explanation:- Access control is a important component of…
Q: 72 Which technelogy prevents the environmont from being over Controlled with performance degrading…
A: Intrusion Detection System(IDS): It is a system that monitors network traffic for suspicious…
Q: If a Web application doesn't validate any client's access to any system resource, which of the…
A: To Do: To find the OWASP Vulnerability.
Q: Based on your understanding, which of the following consequences is most likely to happen if a web…
A: Given: which of the following consequence is most likely to happen if a web application failed to…
Q: A user account lockout after five unsuccessful login attempts. The user account is repeatedly locked…
A: Dictionary attacks require attacker to attempt login and are subject to account lockouts whereas…
Q: reviewing the security logs of a web application, the security team have found traces of unknown…
A: It is defined as a hole or a weakness in the application, which can be a design flaw or an…
Q: Which security mechanism(s) are provided in each of the following cases? A school demands student…
A: Solution: Security mechanisms are of multiple types.
Q: Lab4: Network Security with Cryptography - Implementation Objective: This lab will be able to…
A: Five tools are: 1.GPG: GNU Privacy Guard (PGP): GNU Privacy Guard is a free and open-source…
The question is in the image below.
Step by step
Solved in 2 steps
- A virus that infects a computer by attaching itself to a file that may be run. What should be updated if the executable has to be modified?A virus that attaches itself to an executable file on a computer What should be altered in the executable if it has to be?Specify different methods that may be used to take over a user's session. What countermeasures might you take to this assault?
- Step 1: Set up a worksheet with the appropriate headings and tab names to displaythe filesStep 2: Get the user to select the starting point from which the search must beginStep 3: Get a count for all files and folders in the chosen path and prepare status barStep 4: Monitor time elapsed and give user a chance to exit if it is taking too longStep 5: Get all file and folder names and store in the new worksheet(s) created in step 1Step 6: Save in a new workbook Note that steps 3 and 5 are similar, because you have to read the headers of all fileobjects to determine how many there are. It is necessary to do this so that a message with progress status can be displayed . Write code to implement these steps:I'll explain the mechanics of how a virus may embed itself in an application. How much does the executable need to be changed and why is that?Deluxe Bath Controller (This scenario is used by questions 14 and 15.) At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath. What is the name given to the security attack when an opponent prevents messages from reaching a destination? Denial of service Masquerading Modification of messages Eavesdropping Which of these is the highest-level part of the directory structure on Linux? Directory Topmost Directory File Allocation Table Superblock Which security goal aims to protect information from disclosure? Integrity Confidentiality Authenticity Accountability What does a network switch do? It broadcasts messages to all the computers that are connected to it It job is to disable part of the network It collects all the network cables in one place Routes a message…
- Virus operation that attaches itself to executables. Why is this executable being reworked, and how can it be done?Malware can have various behaviors, explain what these items are: a) Privilege Escalation and how is it accomplished? b) IAT Hooking and Inline Hooking c) DLL Load-Order Hijacking Edit View Insert Format als TahleFor the Agent Tesla malware, please write a short paragraph based on the given background and website info: Agent Tesla is a RAT that targets Windows operating systems. It is available for purchase on criminal forums as Malware-as-a-Service (MaaS). It has various capabilities depending on the version purchased, including capturing keystrokes and screenshots, harvesting saved credentials from web browsers, copying clipboard data, exfiltrating victim files, and loading other malware onto the host. https://www.cisecurity.org/insights/blog/top-10-malware-december-2022 Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then. It is used to steal sensitive information from a victim’s device such as user credentials, keystrokes, clipboard data, credentials from browsers, and other information. This information can then be traded or used for business intelligence or ransom. Agent Tesla is most commonly…
- Identify the name of the hashed algorithm. testuser:$6$mTPGP3fUylBejUpW$vwETSwMoOhGAlEs.OkqxGBu5vb.ellok4tEU hVIRX9E5ukJVOEscZ;DFEF8JAE9mGqnSaMJ3uuGd9/SHrmUHo50 O SHA 512 O SHA 256 O SHA 128 O MD5 Based on the image below, what is the size of salt in bytes? testuser:$6$mTPGP3fUy1BejUpW$vwETSwMoOhGA1ES.0kqxGBu5vb.ellok4tEU hVIRX9E5ukJVOEscZ;DFEF8JAE9mGqnSaMJ3uuGd9/SHrmUHo50 O 8 Bytes O 10 Bytes O 14 Bytes 12 BytesSuppose you have an executable code that installs software on a windows system. Which category of malware will this code fall into if you were to modify the executable code before installation and after installation? Justify your answer.With file protection, you can control how a user can work within worksheets. TRUE OR FALSE