SlideShare a Scribd company logo
Complete the following short answer questions:
1. How do the viruses propagate between computers?
2. What is social engineering?
3. How will an SPI firewall handle a packet containing a TCP segment which is an
acknowledgement?
4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit
access to an FTP server with IP address 10.32.67.112.
5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to
open a connection to an FTP server? Explain.
6. For each of the following passwords, first state the kind of attack that would be necessary to
crack it. Justify your answer. Then say whether or not it is an adequate password, again giving
specific reasons.
a) password
b) Winter1
c) SpringBreaK
d) 2!T*d (00-10)
e) 9g&8tY7#?s+445=232+
Solution
Answers:
1)How do the viruses propagate between computers?
-> The browsers gain more features and functions more methods for virus propagation appear
directly to a computer across the network.
Web pages :
->Either via a download, web code, or a cross-site scripting (CSS) attack, web pages can be a
source of viral infection. As browsers gain more features and functions more methods for virus
propagation appear.
Messages:
-> E-mail messages as well as IM or chat messages can be a vector for viral infection.
-> Whether the virus is spread through links, embedded code, or an attachment depends on the
type of message and the client software.
Infected programs or Trojans :
-> Running an infected program that you copied from a CD or other media (or downloaded) is a
means of infection. Sometimes the virus is a Trojan, where it appears to be a useful program, but
is in fact a virus.
2. What is social engineering?
-> Social engineering is an attack vector that relies heavily on human interaction and often
involves tricking people into breaking normal security procedures.
-> Social engineering is the art of manipulating people so they give up confidential information.
-> A social engineer runs what used to be called a "con game.
Popular types of social engineering attacks :
1)Phishing:
-> Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email,
often purporting to be from a trusted source.
2) Pretexting:
->Pretexting is another form of social engineering where attackers focus on creating a good
pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal
information.
3. How will an SPI firewall handle a packet containing a TCP segment which is an
acknowledgement?
-->Process it through the Access Control List (ACL)
-> Stateful Packet Inspection: Connections have distinct states or stages.
->Different states are subject to different attacks. Stateful firewalls use different filtering rules
for different states. Different because it uses filter rules in order to accept or deny traffic.
->An example would be windows firewall.
4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit access
to an FTP server with IP address 10.32.67.112.?
-> An access control list (ACL) is a table that tells a computer operating system which
accessrights each user has to a particular system object, such as a file directory or individual file.
-> ACLs are a network filter utilized by routers and some switches to permit and restrict data
flows into and out of network interfaces.
-> When an ACL is configured on an interface, the network device analyzes data passing through
the interface.
-> The list has an entry for each system user with access privileges.
-> The most common privileges include the ability to read a file, to write to the file or files, and
to execute the file.
-> Microsoft Windows NT/2000, Novell'sNetWare, Digital's OpenVMS, and UNIX-based
systems are among the operating systems that use access control lists.
-> More advanced lists have more distinct control, but the general guidelines are as follows:
a) A sequence number or term name for each entry.
b)A statement of permission or denial for that entry.
c) the network protocol and associated function or ports.
-> Examples include IP, IPX, ICMP, TCP, UDP, NETBIOS and many others.
5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to
open a connection to an FTP server? Explain.
ACL will apply it's three rules.
1. Allows all connections to port 25.
2. Allow single internal host on port 80.
3. Drops and logs other opening packets.

More Related Content

PDF
Aw36294299
DOCX
Firewalls
PPTX
Network security
PDF
Module 5 (system hacking)
PDF
Formative Task 3: Social Engineering Attacks
PPTX
Firewalls
PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
PPT
Hacking 1224807880385377-9
Aw36294299
Firewalls
Network security
Module 5 (system hacking)
Formative Task 3: Social Engineering Attacks
Firewalls
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking 1224807880385377-9

Similar to Complete the following short answer questions1.  How do the virus.pdf (20)

DOC
Social Engg. Assignment it17 final (1)
PPTX
Network Security & Ethical Hacking
PDF
SCOR-350-701-V6.pdf
PDF
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
PDF
Physical Layer Essay
PPT
Hack the hack
PDF
An overview of unix rootkits
PDF
PPT_Compiled
PDF
Backdoor Entry to a Windows Computer
PPTX
Security and ethics
PPT
ThreatModeling.ppt
PPT
PDF
PDF
Watchguard Firewall overview and implemetation
PPT
Threats, Vulnerabilities & Security measures in Linux
PDF
Is4560
PDF
G011123539
PPTX
Ehical Hacking: Unit no. 1 Information and Network Security
PDF
Backtracking king05
Social Engg. Assignment it17 final (1)
Network Security & Ethical Hacking
SCOR-350-701-V6.pdf
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Physical Layer Essay
Hack the hack
An overview of unix rootkits
PPT_Compiled
Backdoor Entry to a Windows Computer
Security and ethics
ThreatModeling.ppt
Watchguard Firewall overview and implemetation
Threats, Vulnerabilities & Security measures in Linux
Is4560
G011123539
Ehical Hacking: Unit no. 1 Information and Network Security
Backtracking king05

More from mohamednihalshahru (20)

PDF
Which of the following characteristics of living organisms absolutel.pdf
PDF
What influence does the presence of alloying elements (other than ca.pdf
PDF
Two very long uniformly charged lines (with linear charge densities i.pdf
PDF
there is a serious outbreak of staph aureus in the hospital. A conve.pdf
PDF
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdf
PDF
Representatives from four different colleges of UM- Dearborn will be .pdf
PDF
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdf
PDF
please send edited codeMain.javapackage part2;import java.util.pdf
PDF
Inhaling and exhaling Label the figure that shows INHALATION and.pdf
PDF
In accordance to the PLSS land description system, locate the section.pdf
PDF
How can a topologically associating domain (TAD) mutation effect mor.pdf
PDF
Hello, I need help writing a code in C. It wants to do things with f.pdf
PDF
Fix the following C program in linux. When it is compiled it gives t.pdf
PDF
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
PDF
Examine your opinion on the death penalty. Defend why you are for th.pdf
PDF
Do you think that knowing about aggression between groups of chimpan.pdf
PDF
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
PDF
Create a new java class called ListNode. Implement ListNode as a gen.pdf
PDF
Briefly describe the two competing theories regarding the origin of H.pdf
PDF
Atlas Advertising Atlas Advertising is a regional advertising agency.pdf
Which of the following characteristics of living organisms absolutel.pdf
What influence does the presence of alloying elements (other than ca.pdf
Two very long uniformly charged lines (with linear charge densities i.pdf
there is a serious outbreak of staph aureus in the hospital. A conve.pdf
Timer Notes obiect and the dashed arrow the image. The rectangle show.pdf
Representatives from four different colleges of UM- Dearborn will be .pdf
Problem asks me to prove Uniqueness but Im not sure how to do it! .pdf
please send edited codeMain.javapackage part2;import java.util.pdf
Inhaling and exhaling Label the figure that shows INHALATION and.pdf
In accordance to the PLSS land description system, locate the section.pdf
How can a topologically associating domain (TAD) mutation effect mor.pdf
Hello, I need help writing a code in C. It wants to do things with f.pdf
Fix the following C program in linux. When it is compiled it gives t.pdf
7. Wet ear wax (W) is dominant over dry ear wax (w)W=wet ear wax.pdf
Examine your opinion on the death penalty. Defend why you are for th.pdf
Do you think that knowing about aggression between groups of chimpan.pdf
Diana’s Death UnraveledHemophilia causes a lack of blood clotting,.pdf
Create a new java class called ListNode. Implement ListNode as a gen.pdf
Briefly describe the two competing theories regarding the origin of H.pdf
Atlas Advertising Atlas Advertising is a regional advertising agency.pdf

Recently uploaded (20)

PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Lesson notes of climatology university.
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Cell Types and Its function , kingdom of life
PDF
Classroom Observation Tools for Teachers
PDF
Empowerment Technology for Senior High School Guide
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Lesson notes of climatology university.
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Indian roads congress 037 - 2012 Flexible pavement
UNIT III MENTAL HEALTH NURSING ASSESSMENT
202450812 BayCHI UCSC-SV 20250812 v17.pptx
1_English_Language_Set_2.pdf probationary
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Orientation - ARALprogram of Deped to the Parents.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Cell Types and Its function , kingdom of life
Classroom Observation Tools for Teachers
Empowerment Technology for Senior High School Guide
Supply Chain Operations Speaking Notes -ICLT Program
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf

Complete the following short answer questions1.  How do the virus.pdf

  • 1. Complete the following short answer questions: 1. How do the viruses propagate between computers? 2. What is social engineering? 3. How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement? 4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit access to an FTP server with IP address 10.32.67.112. 5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to open a connection to an FTP server? Explain. 6. For each of the following passwords, first state the kind of attack that would be necessary to crack it. Justify your answer. Then say whether or not it is an adequate password, again giving specific reasons. a) password b) Winter1 c) SpringBreaK d) 2!T*d (00-10) e) 9g&8tY7#?s+445=232+ Solution Answers: 1)How do the viruses propagate between computers? -> The browsers gain more features and functions more methods for virus propagation appear directly to a computer across the network. Web pages : ->Either via a download, web code, or a cross-site scripting (CSS) attack, web pages can be a source of viral infection. As browsers gain more features and functions more methods for virus propagation appear. Messages: -> E-mail messages as well as IM or chat messages can be a vector for viral infection. -> Whether the virus is spread through links, embedded code, or an attachment depends on the type of message and the client software. Infected programs or Trojans : -> Running an infected program that you copied from a CD or other media (or downloaded) is a means of infection. Sometimes the virus is a Trojan, where it appears to be a useful program, but
  • 2. is in fact a virus. 2. What is social engineering? -> Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. -> Social engineering is the art of manipulating people so they give up confidential information. -> A social engineer runs what used to be called a "con game. Popular types of social engineering attacks : 1)Phishing: -> Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. 2) Pretexting: ->Pretexting is another form of social engineering where attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal information. 3. How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement? -->Process it through the Access Control List (ACL) -> Stateful Packet Inspection: Connections have distinct states or stages. ->Different states are subject to different attacks. Stateful firewalls use different filtering rules for different states. Different because it uses filter rules in order to accept or deny traffic. ->An example would be windows firewall. 4. Revise the access control list (ACL) in Figure 3-23 (page 119 in the textbook) to permit access to an FTP server with IP address 10.32.67.112.? -> An access control list (ACL) is a table that tells a computer operating system which accessrights each user has to a particular system object, such as a file directory or individual file. -> ACLs are a network filter utilized by routers and some switches to permit and restrict data flows into and out of network interfaces. -> When an ACL is configured on an interface, the network device analyzes data passing through the interface. -> The list has an entry for each system user with access privileges. -> The most common privileges include the ability to read a file, to write to the file or files, and to execute the file. -> Microsoft Windows NT/2000, Novell'sNetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. -> More advanced lists have more distinct control, but the general guidelines are as follows: a) A sequence number or term name for each entry.
  • 3. b)A statement of permission or denial for that entry. c) the network protocol and associated function or ports. -> Examples include IP, IPX, ICMP, TCP, UDP, NETBIOS and many others. 5. How will the ACL in Figure 3-23 (page 119 in the textbook) handle a packet that attempts to open a connection to an FTP server? Explain. ACL will apply it's three rules. 1. Allows all connections to port 25. 2. Allow single internal host on port 80. 3. Drops and logs other opening packets.