294. In Web services, which of the following can lead to a flooding-based denial-of-service (DoS) attack?
a. Source IP address
b. Network packet behavior
c. SOAP/XML messages
d. Business behavior
294. d. Flooding attacks most often involve copying valid service requests and re-sending them to a provider. The attacker may issue repetitive SOAP/XML messages in an attempt to overload the Web service. The user behavior (business behavior) in using the Web service transactions may not be legitimate and is detected, thus constituting a DoS attack. The other three choices may not be detected because they are legitimate where the source IP address is valid, the network packet behavior is valid, and the SOAP/XML message is well formed.
295. It has been said that no system is completely secure and can handle all disasters. Which one of the following items is needed most, even when all the other three items are working properly, to ensure online operation and security?
a. Intrusion detection systems (IDSs)
b. Firewalls
c. Antivirus software
d. File backups
295. d. Intrusion detection systems (IDSs), firewalls, and antivirus software are critical to online security. But no system is completely secure and can handle all disasters. Important files stored on a computer must be copied onto a removable disc and kept in a safe and secure place (i.e., file backups). IDS has detection features, but this is not enough in case of a disaster. Firewalls have protection features, but this is not enough in case of a disaster. Antivirus software has dis-infection features, but this is not enough in case of a disaster.
296. Which of the following technologies enables phone calls and facsimile transmissions to be routed over the same network used for data?
a. File transfer protocol
b. Content streaming
c. Voice over Internet Protocol
d. Instant messaging
296. c. In a Voice over Internet Protocol (VoIP) technology, voice and data are combined in the same network. The other three choices cannot combine voice and data. File transfer protocol (FTP) is used to copy files from one computer to another. Content streaming is a method for playing continuous pictures and voice from multimedia files over the Internet. It enables users to browse large files in real time. Instant messaging (IM) technology provides a way to send quick notes or text messages from PC to PC over the Internet, so two people who are online at the same time can communicate instantly.
297. The network address translation (NAT) changes which of the following from a connectionless network to a connection-oriented network?
a. Internet
b. Transmission control protocol (TCP)
c. Internet Protocol (IP)
d. Switched multimegabit data services (SMDS)
297. a. The network address translation (NAT) changes the Internet from a connectionless network to a connection-oriented network through its converting, mapping, and hiding of the Internet IP addresses. By design, the TCP is a connection-oriented network and both IP and SMDS are connectionless networks, which are not changed by the NAT.
298. Which of the following would be inherently in conflict with a traffic padding security mechanism?
a. Security labels and data splitting
b. Packet-switching network and local-area network
c. Packet-switching network and security labels
d. Local-area network and data splitting
298. b. A traffic-padding security mechanism provides security services such as traffic flow confidentiality. It involves collecting and transmitting spurious cases of communication and data and is used with encryption so that “dummy” data is separated from the real data.
A packet-switching network is in conflict with the traffic-padding security mechanism because it divides the data traffic into blocks, called packets. These packets, a group of binary digits, are delivered to the destination address in a data envelope. Because of a routing function used in packet switching, it is possible that packets can reach their destination out of sequence. The intended traffic-padding security mechanism will not be achieved with the use of a packet-switching network.