289. In electronic auctions, which of the following auction models has a minimal security mechanism that can lead to security breaches and fraud?
a. Business-to-business (B2B)
b. Government-to-business (G2B)
c. Consumer-to-consumer (C2C)
d. Consumer-to-business (C2B)
290. Which of the following causes an increase in the attack surface of a public cloud computing environment?
a. Paging
b. Hypervisor
c. Checkpointing
d. Migration of virtual machines
Paging, checkpointing, and migration of virtual machines can leak sensitive data to persistent storage, subverting protection mechanisms in the hosted operating system intended to prevent such occurrences.
291. Mobile computing is where remote users’ access host computers for their computing needs. Remote access software controls the access to host computers. Which of the following technologies is behind the performance improvement to permit users to work offline on network tasks?
a. Agent-based technology
b. Windows-based technology
c. Hardware-based technology
d. Network-based technology
292. From a security viewpoint, which of the following should be the goal for a virtual private network (VPN)?
a. Make only one exit point from a company’s network to the Internet.
b. Make only one entry point to a company’s network from the Internet.
c. Make only one destination point from a company’s network to the Internet.
d. Make only one transmission point from the Internet to a company’s network.
293. In border gateway protocol (BGP), which of the following is physically present?
a. Routing/forwarding table
b. Adj-Routing Information Base (RIB)-In table
c. Loc-RIB table
d. Adj-RIB-Out table
BGP is used in updating routing tables, which are essential in assuring the correct operation of networks, as it is a dynamic routing scheme. Routing information received from other BGP routers is accumulated in a routing table. These routes are then installed in the router’s forwarding table.
An eavesdropper could easily mount an attack by changing routing tables to redirect traffic through nodes that can be monitored. The attacker could thus monitor the contents or source and destination of the redirected traffic or modify it maliciously.
The adj-RIB-In table routes after learning from the inbound update messages from BGP peers. The loc-RIB table routes after selecting from the adj-RIB-In table. The adj-RIB-Out table routes to its peers that the BGP router will advertise based on its local policy.