Unit 8 assignment
Qsn1.
Answer B-VPN
The IPsec protocol offers end-user traffic by ensuring authentication and confidentiality of data packet. “The IPsec framework is a suite of IETF standards that provides for secure transmission of data over unsecured networks, for example the Internet. IPsec provides protocols to secure communications at the Network Layer along with a mechanism for exchanging identity and security protocol management information (Tech Target, 2008).”
Qsn2.
Answer C-netstat
Netstat is an important tool that helps in checking network and internet connections, generating displays showing network protocol and status (Tech Target, 2008). It is advisable to monitor network connection on your pc to investigate any form of holdups and anomalies.
Qsn3.
Answer C-armored virus
Armored viruses are PC viruses that have found to be risky as it is developed to protect itself from any attempt to detect it. This makes it possible to attack the computer system without being noticed. Armored viruses are developed to make it hard to eliminate after infecting a system.
Qsn4.
Answer C-VoIP
Phreaker is an individual who tries to have access to telephone network illegally by making free long-distance phone calls. The Phreaker attacks try to access the voice over internet protocol (Rouse, 2019).
Qsn5.
Answer B-HTTPS
HTTPS is the secure method to send data between a web browser and a web server. It is mainly developed to increase security data transfer (Cloud Flare, 2020). The HTTPS is critical, particularly during transmission of sensitive data such as organizational and personal information.
Qsn6.
Answer A- It sends malformed packets to the intended victim
Teardrop attack occurs when a user sends deliberately fragmented information packets to the target device. As the packets overlap error occurs in the system tries to resemble the packet (F5 Glossary, 2020). This makes it possible for attacks to take advantage of the system to launch a fatal crash in the application handling the packet.
Qsn7.
Answer F- option d and e only
“The transport layer controls the reliability of communications through flow control, segmentation, and error control. Two great examples of transport protocols are TCP (as in TCP/IP) and UDP. Understanding the differences between TCP and UDP really helps when troubleshooting and when trying to understand the results from a packet capture. TCP, or the Transmission Control Protocol, is connection oriented.”
Qsn8.
Answer E- all of the options
There are a number of very simple steps you can take to protect your wireless network (Tech Target, 2008). For many of these, you will have to access the router’s configuration utility (check your manual on how to do this, you usually have to type an IP address in the browser such as 192.168.0.1 or 192.168.1.1).”
Qsn9.
Answer C-an acceptable probability of occurrence
The project manager needs to understand risks that may affect operations in any organization and prepare strategies to deal with it (Hill, 2016). Effective risk management strategy must identify, assess and prioritize any risk that may occur. Planning for risk is essential for any business.
Qsn10.
Answer C-residual risk is acceptable.
Effective risk management is vital for any organization; therefore, understanding and risk may help organizations in reducing risk impacts in case it strikes (Hill, 2016). Risk residual is the amount of risk left after the inherent risk have been reduced or controlled.
Qsn11.
Answer A- replacement cost
Value of physical assent is mainly based on its replacement cost because it is the amount required to replace an asset in case it is damaged or lost.
Qsn12.
Answer A- Business system analysts
“Business systems analysts are responsible for the analysis, adjustment and restructuring of different aspects of a business. It is a business systems analyst’s responsibility to ensure that a business’s structure is meeting top output efficiency. Business system analysts work closely with individuals at all levels of employment to see what is and isn’t working in the most efficient manner possible (Hill, 2016).”
References
F5 Glossary, (2020). What Is a Teardrop Attack? Retrieved https://www.f5.com/services/resources/glossary/teardrop-attack
Cloud Flare, (2020). What Is HTTPS? Retrieved https://www.cloudflare.com/learning/ssl/what-is-https/
Rouse, M. (2019). What is phreak? Retrieved from https://searchsecurity.techtarget.com/definition/phreak
Tech target (2020). IPsec protocol details for implementing VPNs. Retrieved from https://searchnetworking.techtarget.com/feature/IPsec-protocol-details-for-implementing-VPNs
Hill, B. (2016). What Are the Parts of an Effective Risk Management Program? Retrieved from https://smallbusiness.chron.com/parts-effective-risk-management-program-80857.html