Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

DNS Hijacking & DNS Spoofing Cyber Security Worksheet

DNS Hijacking & DNS Spoofing Cyber Security Worksheet

Description

1. You are the Cyber Security SME for your company, and a young engineer in your department brought you the following clip and asked you what it means. What would you reply to him?

a. DNS Hijacking

b. DNS Spoofing

c. DDoS Attack

d. DNS Lookup

2. Your organization’s website has been under attack. Looking at the incoming traffic, you tell your development team to change TCP stacks by reducing the timeout until stack frees memory allocated to a connection, or selectively drop the incoming connections. What kind of attack is your organization under?

a. DNS Hijacking

b. DNS Spoofing

c. DDoS Attack

d. DNS Lookup

3.Your CEO recently attended a security conference where he learnt that his competitor has implemented measures to monitor the browsing pattern of the employees during the working hours from office, regulate the accessing times, and refrain request from being forwarded to certain websites. He gets very impressed by that and casks you to do the same. What is it that you would implement?

a. Transparent / Forced Inline Proxy

b. Gateway Firewall facing the internet

c. UEBA Tool (User & Entity Behaviour Analysis Tool)

d. All the above

4. “You are the Cyber Security SME in your organization, and whilst scanning the various logs, you come across entries like these. A [web.vortex.data.microsoft.com] spoofed to [192.168.29.188] A [c1.microsoft.com] spoofed to [192.168.29.188] What do you understand from this?”

a. The network router in the organization has been corrupted

b. The DNS Server in the organization has been corrupted

c. The PC is under MITM attack wherein the RP and DNS records are being spoofed

d. None of the above

5. “You are working as a Cyber Security SME responsible for all aspects of security. Your development team has been involved in creating the source host domain http://www.myapparels.com to host the new business. The team also created two other associated domains http://www.myapparesl.com:81 and www.demo.apparels.com. All the files and repo were located under directories /repo, /men, /women, /kids under these three domains. Thereafter they also created a secure site to improve security in https://www.myapparels.com. The web testing team was using two machines with Explorer and Chrome for accessing these sites. Based on this scenario wherein the tester has logged into the source home domain

http://www.myapparels.com, answer the following questions.”

(a) Is http://www.myapparels.com/repo/page.htm accessible from the Explorer browser?

a. True

b. False

(b) Is http://www.myapparels.com/repo/page.htm accessible from Chrome Browser?

a. True

b. False

(c) Is http://www.myapparels.com/men/page.htm from Explorer browser?

a. True

b. False

(d) Is http://www.myapparels.com:81/repo/page.htm accessible from the Chrome browser

a. True

b. False

(e) Is http://www.myapparels.com:81/repo/page.htm accessible from the Explorer browser

a. True

b. False

(f) The http://www.demo.myapparels.com/women/page.htm is NOT accessible from the Explorer browser.

a. True

b. False

(g) The http://www.demo.myapparels.com/women/page.htm is NOT accessible from the Chrome browser.

a. True

b. False

(h) The https://www.myapparels.com/kids/page.htm is NOT accessible from both the Explorer and Chrome browsers

a. True

b. False

6. Which of the following statement regarding Web Service is NOT correct?

a. Web Service is the key open protocol which initiates the Request and Response protocol from the Server and Client-side

b. A web service is a collection of open protocols and standards used for exchanging data between applications or systems that are running from different sources

c. Web Service are implemented using the Simple Object Access Protocol and Representational state transfer protocol.

d. Web services are XML-based information exchange systems that use the internet for direct application-to-application interaction. These systems can include programs, objects, messages, or documents.

7. Which of the following statements best describe the functionality of the REST protocol?

a. REST can handle a variety of data formats, and with JSON, it provides faster data transfer and better support for browser clients. It is easier to implement & integrate with existing websites with no need to refactor site infrastructure

b. REST uses caching for information that is not altered & not dynamic, using less bandwidth it gives superior performance, which is why Google, Amazon, eBay, Yahoo use it

c. A above

d. Both A & B above

8. Which of the following statements is NOT true?

a. The Document Object Model (DOM) defines the objects, properties, and methods to access all XML elements and has 3 components viz., Core DOM, XML DOM, HTML DOM

b. XML DOM is language and platform independent, organized in a hierarchy for easy navigation

c. The XML DOM is very memory efficient and is extremely fast

d. The Document Object Model (DOM) is an application programming interface (API) for accessing HTML and XML documents.

9. Which language is used by UDDI?

a. XML

b. WSDL

c. SOAP

d. None of the above.

10. You are working as a Cyber Security SME for a medium-sized company. The policy of your company dictates that a proxy server be installed so that Twitter & Facebook can be blocked during working hours What would your recommendation be from the following options?

a. Caching Proxy

b. IP Proxy

c. Content Filter

d. Web Security Gateway

11. You are working as a Cyber Security SME for a medium-sized company. Your company policy dictates that communications with the web server should ensure message integrity, confidentiality, and compression. What would your recommendation be for your team?

a. REST

b. XML-RPC

c. XML-DOM

d. SSL

12. What is the combination of the Key exchange, Hash, and Encryption Algorit hm agreed between the Client and the Server called as

a. Protocol List

b. Cipher Suite

c. Key List

d. Communication Suite

13. You are working as a Cyber Security SME responsible for all aspects of security. Your development team has put up two sites:- Site A- https//www.myapparels.com and Site B- http://www.myapparels2.com They have loaded different scripts, images, videos, and content. There is a lot of confusion amongst the developers regarding what scripts and content can run on which site with respect to the SOP principles. Please clarify their questions given below with Site A as the origin:-

(a) Scripts can be loaded from Site B, but they can be executed in Site A’s context

True

False

(b) Can read the raw content of the script and source code from Site B

True

False

(c) The CSS from Site B can be loaded

True

False

(d) The raw text of the CSS from Site B can be read

True

False

(e) The page from Site B cannot be loaded using iFrame

True

False

(f) The DOM of the iFrame loaded from Site B cannot be reached

True

False

(g) The images and videos hosted on Site B can be loaded

True

False

(h) The pixel values of the images and frame grabbing of the videos loaded from Site B can also be undertaken

True

False )

14. What are the various components of a Web Service Protocol stack?

a. Service Transport, Service Description, Service Discovery, Service Library b. Service Transport, XML Messaging, Service Description, Service Discovery

c. TLS Transport, XML Messaging, Service Library, Service Discovery

d. Service Transport, HTTPS/TLS Messaging, Service Description, Service Discovery

15. Your development team is in discussion with your CEO on how some of the web services can be developed quickly. A young engineer who joined the organization just two days back suggested that “we can also use C# to build new web services on Windows that can be invoked from web application that is based on Java Server Pages (JSP) and it can run on the existing Servers with Linux OS.” Your CEO listened to this absurd suggestion and asked you if that is possible and you respond as _____

a. I agree with the suggestion as it is possible

b. No, what he suggests is not technically feasible

c. It is partially correct, but we need to change the base OS on our servers

d. We may need to use ASP.net instead of C#

16. “As the Cyber Security SME, you were auditing your organization’s databases and the applications that are establishing connections to it for carrying out transactions as the data stored in the database are confidential in nature. You come across the following lines of code:

my $username=param(‘username’);

my $password=param(‘password’);

(IsValidUsername($username) == 1)

{

if (IsValidPassword($username, $password) == 1)

{print “”Login Successful””;}

else

{print “”Login Fail

ed

incorrect password””;}

}

else

{print “”Login Failed

unknown username””;}

Analyze the code and answer the following questions.”

(a) What is the vulnerability as per the CWE list, this code is exposing itself to?

1. Exposure of Sensitive Information to an Unauthorized Actor

2. Missing Encryption of Sensitive Data

3. Improper Access Control

4. Reliance on Untrusted Inputs in a Security Decision

(b) Is the statement “The output messages is helpful to a user but can be useful to a potential attacker” incorrect?

1. True

2. False

(c) The potential attacker can understand the state of the login function and try different username followed by the password

True

False

(d) The code should have inbuilt compartmentalization to protect sensitive information from being shared with unauthorized users.

True

False

(e) The error message being displayed here should be more cryptic. The appropriate message can be “Login Failed- incorrect username or password”

True

False

17. “As the Cyber Security SME, you were auditing your organization’s databases and the applications that are establishing connections to it for carrying out transactions.

You come across the following lines of code:-

try {

openDbConnection();

}

//print exc

eption message that includes exception message and configuration file location

catch (Exception $e) {

echo ‘Caught exception: ‘, $e

>getMessage(), ‘

n’;

echo ‘Check credentials in config file at: ‘, $Mysql_config_location, ‘

n’;

}

Which of the following statements are correct?”

a. The code is vulnerable, it leads to Exposure of Sensitive Information to an Unauthorized Actor

b. The connection to the database will not be successful due to error in the code

c. The exception handling is improper.

d. The attacker can read the configuration file gaining the credentials thereafter.

e. A & D above

18. “As the Cyber Security SME, You were auditing your organization’s databases and the applications that are establishing connections to it for carrying out transactions

You come across the following lines of code, which part of the CIA triad of the database is affected by it:-

try {

URL u = new URL(“”http://www.secret.example.org/””);

HttpURLConnection hu = (HttpURLConnection) u.openConnection();

hu.setRequestMethod(“”PUT””);

hu.connect();

OutputStream os = hu.getOutputStream();

hu.disconnect();

}

catch (IOException e) {

//…

}”

a. Confidentiality

b. Integrity

c. Availability

d. None of the above

19. You were auditing your organization’s database architecture. You came across an initial consultancy report from a third-

party agency that gave recommendations regarding the architecture to be followed after carrying out a detailed study. Whilst scanning through the report and seeing what has been implemented, you find that even though the consultancy firm recommended an MVC architecture, your team had decided otherwise. What can be the possible issues/threats this database is likely to face when you go live.

a. Internal data threats

b. Database backup exposure

c. SQL Injection

d. Denial of Service attacks

20. Your company faced a data leak incident a month back. After carrying out a forensic analysis of the artifacts and evaluating your IT team, the third-party auditing agency gave a report. One line in the report attracted your attention:-

“Your databases have default accounts, and the IT team should be highly qualified and experienced to avoid repetition of such incidents in the future.” What kind of threat is he trying to mitigate here?

a. SQL Injection

b. DB Vulnerabilities and Misconfigurations.

c. Database backup exposure

d. Denial of Service attacks

21. Relational Calculus is a _________________ language

a. Procedural

b. Non-Procedural

c. Data Definition

d. Low Level

22. You were auditing your organization’s database and you find that privileges given to the various users are more than what you felt was necessary. The recent cyber security report published that the current company employees or ex-employees execute over 80% of the attacks on company databases. Which of the following measures you would choose to mitigate this threat?

a. Create multiple databases with the information distributed in such a manner that even if one database is compromised, the damage will be minimal.

b. Deploy and uphold a strict access and privileges control policy. Do not grant excessive privileges to company employees and revoke outdated privileges in time.

c. Screen all the employees to identify those with malicious intent. Install a User Behaviour & Entity Analysis software to profile the employees based on their actions.

d. Setup an extensive log monitoring system to keep track of malicious data access and file transfers.

23. You are the Cyber Security SME, and your organization has several forms of In tellectual property that are labelled as confidential trade secrets for which you must provide highest level of protection. The data is in several data type forms like videos, audio, documents which need to be accessed based on locations, time and some the owner must decide What type of control methodology best fits your organization?

a. Role-Based Access Control (RBAC)

b. Rule-Based Access Control (RuBAC)

c. Attribute-Based Access Control (ABAC)

d. Discretionary Access Control (DAC)

24. You are the Cyber Security SME, and your development team is creating a database that will have, amongst all the information, a set of highly classified data. Your database OEM has released a patch for a recent vulnerability that has come out regarding data leak from the schema. Your database has a lot of information, and your project is at a crucial phase. Your developers are not very keen to patch this system as the confidence level on the patch is low. What would you recommend to them?

a. Let us contact the OEM to give more information pertaining to the patch which has been released and seeks clarifications

b. Due to the sensitivity of the vulnerability, patch all the affected systems immediately.

c. Let us apply the patch with the option of roll back to the last known good state in case of any issue may arise affecting our application performance and monitor the performance closely

d. Regulator notification may be issued to keep us clear

25. You are the Cyber Security SME, and your development team is creating a d

atabase that will have, amongst all the information, a set of highly classified data. Your database designer is sitting with you seeking your advice as to how should he be designing the security for the database What will be your advice?

a. It must be classified by the information security officer and restricted to those who have made a formal request for access

b. It must be restricted to those in the department of origin for the information

c. It must be available to anyone in the organization whose work relate to the subject and requires authorization for each access

d. The access to the table should be limited to named individuals and maintain a strict audit trail

26. Why is an inference from a database such an important security problem to address?

a. Statistics may be deduced from having access to records

b. Granular access rules may be difficult to implement in database environments

c. Private information may be deduced from aggregate data

d. Multiple database queries using analysis tools cannot be prevented

27. How can polyinstantiation be used to protect a sensitive database?

a. It confirms that all sensitive data within the system conforms to integrity checking

b. It prevents lowlevel users from inferring the existence of higherlevel data

c. It ensures that all security mechanisms within the database management system are working together to enforce the security policy

d. It ensures that two processes trying to access the same element will randomize the access to ensure integrity


Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Writers Hero only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Writers Hero are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Writers Hero is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Writers Hero, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.