Describe two TCP congestion control-based attacks: ACK Division and Optimistic ACKing. For each, explain the resulting impact on network performance.
Which statement best describes why cryptography failures oft…
Which statement best describes why cryptography failures often occur?
The Same Origin Policy allows subdomains to share data autom…
The Same Origin Policy allows subdomains to share data automatically without any extra configuration.
The principle of Least Privilege means
The principle of Least Privilege means
True or False: Circuit gateways operate at a higher layer th…
True or False: Circuit gateways operate at a higher layer than packet filters but lower than application gateways.
Describe the two main security protocols in IPSec (AH and ES…
Describe the two main security protocols in IPSec (AH and ESP). For each, state what security services it provides (authentication, integrity, confidentiality, replay protection) and one scenario where it would be preferred over the other.
According to the Same Origin Policy table, a request from ht…
According to the Same Origin Policy table, a request from http://www.example.com to https://www.example.com fails because of:
Which statement is true about public-key (asymmetric) crypto…
Which statement is true about public-key (asymmetric) cryptography compared to symmetric?
True or False: Extended ACLs in filesystems provide more gra…
True or False: Extended ACLs in filesystems provide more granular control than the traditional owner/group/other model.
Anomaly-based IDS models:
Anomaly-based IDS models: