Question: #7808

IT286X Assessment 4 Complete Solution

Assessment Grading Rubric
Course: IT286X Assessment 4 Points: 200

Project Directions


This component of the Course Assessment consists of 6 to 10 page Project assessed in the following learning outcome:


IT286-4: Examine cryptography methods, vulnerabilities, threats, and malicious attacks.
Once you start the Assessment, you will have 1 week to complete the Project. You must submit your Project to the Dropbox within the specified time. When you are ready to submit it, go to the Dropbox and complete the steps below, or download the directions here: http://extmedia.kaplan.edu/global/DropboxGuide_s.pdf:


• Click the link that says “Submit an Assignment.”
• In the “Submit to Basket” menu, select “Essay.”
• Click the “Add Attachments” button.
• Follow the steps listed to attach your Word documents.
Use the following convention to name your Project: IT286‐Outcome1‐LastName‐ FirstInitial, where your own name is typed (example: IT286‐Outcome4‐Smith-J). Submit the completed document as an attachment to the basket.
Make sure that you save a copy of your submitted Project. When you are finished, select “Submit for Grade.” Please notify Academic Advising when your Project is submitted and ready for grading.
A Kaplan University faculty member will grade the Project within 48 hours and notify your advisor of your grade. A score of 80% or better is required to pass this portion of the Course Assessment. A score of at least 80% on each of the five Assessments is required to pass the Course Assessment for full course credit.
Outcome Assessment 4 Project Requirements
Provide a brief explanation of the following questions:
1. Select the best answer and provide a brief explanation (approx. 1/4 page essay) for each of the following questions:
A. What kind of cryptographic method creates ciphertext by replacing one character with another from a “match-up list”?
a. Watermark cipher
b. Transposition cipher
c. Steganographic cipher
d. Substitution cipher
B. Which method of code breaking tries possible combinations of characters in an attempt to “guess” the password or key?
a. Frequency analysis
b. Mathematical
c. Brute Force
d. Algorithm cracking
C. Which encryption algorithm replaced DES as the current standard?
a. AES
b. CAST
c. Triple-DES
d. Blowfish
Assessment Grading Rubric
Course: IT286X Assessment 4 Points: 200
Copyright Kaplan University
D. The area of an application that is available to users (those who are authenticated as well as those who are not) is known as its _________?
a. trust model
b. DFS
c. attack surface
d. Security Control Framework
E. When an attacker gains access to restricted directories (such as the root directory) through HTTP it is called _____________?
a. root injection
b. cross-site forgery
c. directory traversal
d. LDAP injection
2. Describe at least four classifications of viruses and the methods used to defeat them.
3. Compare in detail the functional differences between symmetric encryption algorithms and asymmetric encryption algorithms.
4. Describe at least four application attacks and the methods used to defeat them.
5. Discuss three security tools that can be used to identify security vulnerabilities. Explain why different types of tools are needed.
6. Outline the process used in Public Key Infrastructure. What are the components? What are guidelines for PKI management?
Project grading rubric=200 points
Project Criteria
Points Possible
Points Earned
1. Complete five questions.
1–A. 4 points for correct answers. 6 for explanation.
0–10
1–B. 4 points for correct answer. 6 for explanation.
0–10
1–C. 4 points for correct answer. 6 for explanation.
0–10
1–D. 4 points for correct answer. 6 for explanation.
0–10
1–E. 4 points for correct answer. 6 for explanation.
0–10
Assessment Grading Rubric
Course: IT286X Assessment 4 Points: 200
Copyright Kaplan University
2. Describe at least four classifications of viruses and the methods used to defeat them.
0–30
3. Compare in detail the functional differences between symmetric encryption algorithms and asymmetric encryption algorithms.
0–30
4. Describe at least four application attacks and the methods used to defeat them.
0–30
5. Discuss three security tools that can be used to identify security vulnerabilities. Explain why different types of tools are needed.
0–30
6. Outline the process used in Public Key Infrastructure. What are the components? What are guidelines for PKI management?
0–30
Column Total
0–200
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.
New total after deductions.

Solution: #7818

IT286X Assessment 4 Complete Solution

Brute Force way of code breaking tries possible mixtures of characters in a try to ...
Tutormaster
Rating: A+ Purchased: 11 x Posted By: Vikas
Comments
Posted by: Vikas

Online Users