ECET460 FinalExam

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

ECET 460 Final Exam

----------------------------------------------------------------------------------------------------------------------------------
Question 25 20 pts

(TCO 8) In this course, what were grade percentages for Project Topic, Project Paper Draft, Content, Format,
and Project Presentation?

Project Topic: 10%

Project Paper Draft: 20%

Content: 40%

Format: 20%

Project Presentation: 10%

-------------------------------------------------------------------------------------------------------------------------------------

24. (TCO 6) What is the purpose of HTTPS?

HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL
certificate. HTTPS strengthens HTTP by incorporating SSL or TLS.

HTTPS is the worldwide standard and the purpose of this tool is it is used for payment transactions and for
other data-sensitive Internet transactions.

-------------------------------------------------------------------------------------------------------------------------------------
23.
(TCO 4) Explain Distributed Denial of Service (DDos).

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted
server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet
traffic.

A (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually
one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a
botnet) flooding the targeted system with traffic.

22. (TCO 2) Explain what a digital signature is.

A digital signature is a mathematical technique used to validate the authenticity and integrity of
a message, software or digital document. The digital equivalent of a handwritten signature or
stamped seal, a digital signature offers far more inherent security, and it is intended to solve the
problem of tampering and impersonation in digital communications.
ECET 460 Final Exam

(TCO 1) Explain integrity objective of CIA of computer security?

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide
policies for information security within an organization. The model is also sometimes referred to as the AIC
triad (availability, integrity and confidentiality) to avoid confusion with the Central Intelligence Agency. The
elements of the triad are considered the three most crucial components of security.

 Confidentiality,
 Integrity &
 Availability

Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life
cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered
by unauthorized people

----------------------------------------------------------------------------------------------------------------------------------
19.
In addition to providing message integrity for SSL connection, what other service does the
SSL record protocol for SSL connection?

The SSL Record Protocol provides two services for SSL connections. Apart from providing
message integrity for SSL connection SSL Record Protocol also provides Confidentiality for
SSL connections. The Handshake Protocol defines a shared secret key that is used for
conventional encryption of SSL payloads.

 Confidentiality: The Handshake Protocol defines a shared secret key that is used for

conventional encryption of SSL payloads.

----------------------------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------------------------
ECET 460 Final Exam

----------------------------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------------------------

You might also like