True/False (21 pts) – Please type either True or False in red font color in the area following the question number. 1.
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
True/False (21 pts) – Please type either True or False in red font color in the area following the question number. 1.
True/False (21 pts) – Please type either True or False in redfont color in the area following the question number.1. A passive assessment is a picture of the network at a point intime.2. As a best practice, all users in the organization who connectto a network, such as the Internet or through a firewall, mustconform to the organization’s security policy.3. Security through obscurity is proving to be a valid securitybest practice.4. Category 6 unshielded twisted pair wire is great because it isimpervious to electromagnetic interference.5. When writing scripts, using prepared statements does not tendto be efficient and provides almost no protection against SQLinjection.6. Because databases are an integral part of daily computing in atlarge organizations, they are not subject to hostile code.7. One zero-day vulnerability was exploited in the Stuxnetattack.8. Without CGI, the information users would get from aninformation server would not be packaged based on the request butbased on how it is stored on the server.9. Category 6 shielded twisted pair is proving to be as secure asfiber optic cable.10. Developing a sound security strategy involves keeping an eyeon the reality of the changing technology security scene andrapidly increasing security threats.11. The cardinal rule of a secure communication protocol in aserver is to leave ports open no more than a few hours in theabsence of a useful service.12. As long as the half-open port remains open, an intruder canenter the system because while one port remains open, the servercan still entertain other three-way handshakes from other clientsthat want to communication with it.13. The fact that many exploits use known vulnerabilities isindicative of our ability to patch known vulnerabilities even ifthe solutions are provided.14. With fiber-optic cable, it is possible to eliminate all noiseand prevent interception of data.15. Security threats that can happen to a broken script includemalicious code provided by one client for another client andmalicious code sent inadvertently by a client.16. A prominent hacker attack is to embed malicious scripts intodynamic unsuspecting Web and network scripts.17. Analog communication is typically more efficient and easier tosecure than digital communications.18. A DDoS is typically accomplished by flooding the targetedmachine or resource with superfluous requests to overload systemsand prevent some or all legitimate requests from beingfulfilled.19. It is usually possible to decrypt a hash and obtain theoriginal plaintext value.20. A passive assessment offers a more accurate listing of who isactually using the network over a period of time.21. A huge issue in fixing vulnerable systems is that demand forskilled system administrators and cybersecurity experts far exceedthe supply.