Skip to main content

Posts

Showing posts with the label it

Wireless Security - Course-era (Google IT Professional Course)

  Wireless Security TOTAL POINTS 4 1 . Question  1 Defense against digital dark arts Video link: https://youtu.be/Ug5DZcF2NvY What are some of the weaknesses of the WEP scheme? Check all that apply. 1 / 1 point Its use of ASCII characters for passphrases Its use of the RC4 stream cipher Correct You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure. Its poor key generation methods Correct You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure. Its small IV pool size Correct You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure.

Secure Network Architecture (Course-era Google IT Professional Certificate) Quiz

  Secure Network Architecture TOTAL POINTS 7 Video link: https://www.youtube.com/watch?v=raoM2SrPsrU 1 . Question  1 VIDEO LINK: HTTPS://WWW.YOUTUBE.COM/WATCH?V=RAOM2SRPSRU Why is normalizing log data important in a centralized logging setup? 1 / 1 point Log normalizing detects potential attacks. Uniformly formatted logs are easier to store and analyze. It's difficult to analyze abnormal logs. The data must be decrypted before sending it to the log server. Correct Nice work! Logs from various systems may be formatted differently. Normalizing logs is the practice of reformatting the logs into a common format, allowing for easier storage and lookups in a centralized logging system. 2 . Question  2 What type of attacks does a flood guard protect against? Check all that apply. 1 / 1 point DDoS attacks Correct You got it! A flood guard protects against attacks that overwhelm networking resources, like DoS attacks and SYN floods. Man-in-the-middle attacks Malware infections SYN floods C