Skip to main content

Posts

Showing posts from May, 2022

IS5403 Week 8 Post Assessment

An unskilled person who downloads automated attack software (i.e. open-source intelligence) and uses it to carry out attacks would be considered to be what type of threat actor? cracker organized criminal hactivist script kiddie CORRECT   An Advanced Persistent Threat is most commonly associated with what type of threat actor? insiders hactivists script kiddie nation state actors CORRECT How is confidentiality ensured using the IPsec VPN protocol? By using IPsec's Tunnel Mode. By using the Authentication Header (AH) protocol. By using the Encapsulating Security Payload (ESP) protocol. By using IPsec's Transport Mode. INCORRECT What encryption protocol is used for the WPA2 wireless standard? Galois/Counter with Cipher Block Chaining Message Authentication Code Protocol (GCMP) Counter Mode with Ecliptic Curve Block Message Authentication Code Protocol (ECBMP) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Temporal Key Integrity Protocol (TKIP)