Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber OPS Final Exam well answered

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
30-07-2022
Written in
2021/2022

Five pillars of cyber security Confidentiality, Integrity, Authentication, Non-repudiation, Availability What is the binary representation of 0x3E4 01:05 01:36 What is the binary representation of the decimal number 110? (long division). The first 4 bytes of data for a file are: . What tool would you use to look at the bytes of this file to determine what type of file it is? Frhed HEX editor What is a better indicator of file type - file extensions or file headers? Explain your answer. File headers, because they are needed to open the file correctly. Someone can change the file extension, and the file could still open if the file header was correct. Putting on your CSI hat, use at least 3 aspects of the Cyber Domain to explain why it is difficult to determine exactly who launched a cyber-attack. 1. Cyber attacks often take on the persona of someone else online. It is not difficult for an attacker to do. 2. Cyber attackers can change their IP addresses and make it look like they are coming from a different geographical location. 3. Cyber attacks, often manipulate the circuit aspect to send data across the internet making it very difficult to trace. What are the five aspects of the Cyber Domain? Logic, Persona, Geographical, Circuit, and Interface A system administrator for a network at the Naval Academy is deciding how to set up a new video game service for the Mids. His first thought is to set the game up with administrator privileges, as this will make it easier for him to add users and make stylistic changes. From a security standpoint, how should he set the game up for all the users on the network? Explain your answer. He should set it up with the least amount of privilege needed to run the service--- preferably with user privileges and not administrator privileges. That way, if an attacker were able to take over the service, they would only have user privileges and not administrator privileges. What service does an operating system provide? 1. It provides services to users and programs 2. It manages all the different storage-related peripherals, like hard drives, flash drives, DVD's, etc. 3. It can manage network connections for users. What can a normal computer user do to help secure their system? 1. Decide not to open an email attachment from someone they don't know. 2. Change passwords frequently, use strong/complex passwords, and don't reuse passwords across systems/networks. 3. When using WIFI, choose to only use networks that implement WPA2. In the Estonia use case, the government ultimately decided to shut down the country's access to the internet until they could mitigate the attacks that were occurring. What pillar of cyber security did this affect and why was this a drastic measure? It affected availability. It was a drastic measure because it cut off the country entirely from the rest of the world when it came to the internet. This was done as a last resort because less severe measures (like trying to isolate where the attack came from) were unsuccessful.

Show more Read less
Institution
Course

Content preview

Cyber OPS Final Exam
Five pillars of cyber security - Answer Confidentiality, Integrity, Authentication, Non-
repudiation, Availability

What is the binary representation of 0x3E4 - Answer 0011 1110 0100

What is the binary representation of the decimal number 110? (long division). - Answer
0110 1110

The first 4 bytes of data for a file are: 0101 0010 0100 1001 0100 0110 0100 0110. -
Answer 0101 0010

What tool would you use to look at the bytes of this file to determine what type of file it
is? - Answer Frhed HEX editor

What is a better indicator of file type - file extensions or file headers? Explain your
answer. - Answer File headers, because they are needed to open the file correctly.
Someone can change the file extension, and the file could still open if the file header
was correct.

Putting on your CSI hat, use at least 3 aspects of the Cyber Domain to explain why it is
difficult to determine exactly who launched a cyber-attack. - Answer 1. Cyber attacks
often take on the persona of someone else online. It is not difficult for an attacker to do.
2. Cyber attackers can change their IP addresses and make it look like they are coming
from a different geographical location.
3. Cyber attacks, often manipulate the circuit aspect to send data across the internet
making it very difficult to trace.

What are the five aspects of the Cyber Domain? - Answer Logic, Persona,
Geographical, Circuit, and Interface

A system administrator for a network at the Naval Academy is deciding how to set up a
new video game service for the Mids. His first thought is to set the game up with
administrator privileges, as this will make it easier for him to add users and make
stylistic changes. From a security standpoint, how should he set the game up for all the
users on the network? Explain your answer. - Answer He should set it up with the least
amount of privilege needed to run the service--- preferably with user privileges and not
administrator privileges. That way, if an attacker were able to take over the service, they
would only have user privileges and not administrator privileges.

What service does an operating system provide? - Answer 1. It provides services to
users and programs
2. It manages all the different storage-related peripherals, like hard drives, flash drives,
DVD's, etc.

, 3. It can manage network connections for users.

What can a normal computer user do to help secure their system? - Answer 1. Decide
not to open an email attachment from someone they don't know.
2. Change passwords frequently, use strong/complex passwords, and don't reuse
passwords across systems/networks.
3. When using WIFI, choose to only use networks that implement WPA2.

In the Estonia use case, the government ultimately decided to shut down the country's
access to the internet until they could mitigate the attacks that were occurring. What
pillar of cyber security did this affect and why was this a drastic measure? - Answer It
affected availability. It was a drastic measure because it cut off the country entirely from
the rest of the world when it came to the internet. This was done as a last resort
because less severe measures (like trying to isolate where the attack came from) were
unsuccessful.

When host A needs to send a packet to host B, it calculates their respective Network
addresses by combining what two values? - Answer IP Address + Subnet Mask

What pillar of cyber security do both symmetric and asymmetric encryption provide AND
what problem with symmetric encryption does asymmetric encryption solve? - Answer
Both types of encryption provide confidentiality. Asymmetric encryption solves the key
exchange problem for symmetric encryption.

Look At firewall diagram. - Answer Just do it.

Port number for:
1. HTTP
2. HTTPS
3. SSH
4. DNS - Answer 80, 443, 22, 53

List the 3 Cyber Security Defensive principles and provide a brief (one sentence)
description of each. - Answer 1. Least Privilege: Gives users and programs the
privileges they need and no more.
2. Defense in Depth: Having multiple lines of defense for networks and hosts.
3. Vigilance: users and administrators need to watch what's happening on their network,
looking for signs of intrusion.

Explain why storing of hashes of passwords is more secure than just storing passwords.
Also explain what adding a salt value provides. - Answer Storing hashes of passwords
obscures what the passwords are if someone were to steal the password file. Adding a
salt to a password ensures that two identical passwords would hash to different values.
Adding salts to passwords helps to prevent dictionary styles of attacks. (Salt
randomizes hashes).

Written for

Course

Document information

Uploaded on
July 30, 2022
Number of pages
13
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5206
Member since
4 year
Number of followers
3567
Documents
55688
Last sold
1 day ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions