Page 1 of 1

True/False (21 pts) – Please type either True or False in red font color in the area following the question number. 1.

Posted: Fri Jul 01, 2022 5:46 am
by answerhappygod
True/False (21 pts) – Please type either True or False in redfont color in the area following the question number.1. ​A passive assessment is a picture of the network at a point intime.2. ​As a best practice, all users in the organization who connectto a network, such as the Internet or through a firewall, mustconform to the organization’s security policy.3. ​Security through obscurity is proving to be a valid securitybest practice.4. ​Category 6 unshielded twisted pair wire is great because it isimpervious to electromagnetic interference.5. ​​When writing scripts, using prepared statements does not tendto be efficient and provides almost no protection against SQLinjection.6. ​Because databases are an integral part of daily computing in atlarge organizations, they are not subject to hostile code.7. ​One zero-day vulnerability was exploited in the Stuxnetattack.8. ​Without CGI, the information users would get from aninformation server would not be packaged based on the request butbased on how it is stored on the server.9. ​Category 6 shielded twisted pair is proving to be as secure asfiber optic cable.10. ​Developing a sound security strategy involves keeping an eyeon the reality of the changing technology security scene andrapidly increasing security threats.11. ​The cardinal rule of a secure communication protocol in aserver is to leave ports open no more than a few hours in theabsence of a useful service.12. ​As long as the half-open port remains open, an intruder canenter the system because while one port remains open, the servercan still entertain other three-way handshakes from other clientsthat want to communication with it.13. ​​The fact that many exploits use known vulnerabilities isindicative of our ability to patch known vulnerabilities even ifthe solutions are provided.​14. ​With fiber-optic cable, it is possible to eliminate all noiseand prevent interception of data.15. ​Security threats that can happen to a broken script includemalicious code provided by one client for another client andmalicious code sent inadvertently by a client.16. ​A prominent hacker attack is to embed malicious scripts intodynamic unsuspecting Web and network scripts.17. ​Analog communication is typically more efficient and easier tosecure than digital communications.18. ​A DDoS is typically accomplished by flooding the targetedmachine or resource with superfluous requests to overload systemsand prevent some or all legitimate requests from beingfulfilled.19. ​It is usually possible to decrypt a hash and obtain theoriginal plaintext value.20. ​A passive assessment offers a more accurate listing of who isactually using the network over a period of time.21. ​A huge issue in fixing vulnerable systems is that demand forskilled system administrators and cybersecurity experts far exceedthe supply.