Barbara, a security professional, was monitoring the loT traffic through a security solution. She identified that one of the infected devices is trying to connect with other loT devices and spread malware onto the network. Identify the port number used by the malware to spread the infection to other loT devices.
Port 48101 is the port number used by the malware to spread the infection to other loT devices. This port is associated with the Mirai botnet, which is one of the most notorious loT malware that targets vulnerable loT devices and turns them into a network of bots that can launch distributed denial-of-service (DDoS) attacks. Mirai scans the internet for loT devices that use default or weak credentials and infects them by logging in via Telnet or SSH. Once infected, the device connects to a command and control (C&C) server on port 48101 and waits for instructions. The C&C server can then direct the botnet to attack a target by sending TCP, UDP, or HTTP requests. Mirai has been responsible for some of the largest DDoS attacks in history, such as the one that disrupted Dyn DNS in 2016 and affected major websites like Twitter, Netflix, and Reddit. Reference:
Mirai (malware), Wikipedia, March 16, 2021
Mirai Botnet: A History of the Largest loT Botnet Attacks, Imperva, December 10, 2020
Mirai Botnet: How loT Devices Almost Brought Down the Internet, Cloudflare, March 17, 2021
Cibel.org, an organization, wanted to develop a web application for marketing its products to the public. In this process, they consulted a cloud service provider and requested provision of development tools, configuration management, and deployment platforms for developing customized applications.
Identify the type of cloud service requested by Cibel.org in the above scenario.
Finch, a security professional, was instructed to strengthen the security at the entrance. At the doorway, he implemented a security mechanism that allows employees to register their retina scan and a unique six- digit code, using which they can enter the office at any time.
Which of the following combinations of authentication mechanisms is implemented in the above scenario?
Which of the following protocols uses TLS/SSL to ensure secure transmission of data over the Internet?
HTTPS (Hypertext Transfer Protocol Secure) is a protocol that uses TLS/SSL to ensure secure transmission of data over the Internet. HTTPS is an extension of HTTP, which is the standard protocol for transferring data between web servers and browsers. HTTPS encrypts the data exchanged between the client and the server, preventing anyone from intercepting, modifying, or stealing the data. HTTPS also verifies the identity of the server using digital certificates, preventing spoofing or phishing attacks. HTTPS is widely used for web applications that handle sensitive information, such as online banking, e-commerce, or social media. Reference:
HTTPS - Week 7: Email Security
How does SSL work? | SSL certificates and TLS | Cloudflare
SSL and TLS: A Beginners Guide | SANS Institute
Which of the following techniques is referred to as a messaging feature that originates from a server and enables the delivery of data or a message from an application to a mobile device without any explicit request from the user?
Iluminada
7 days agoLashawn
9 days agoCandra
1 months agoAimee
2 months agoVicky
2 months agoKristofer
2 months agoDong
2 months agoBobbie
3 months agoEvette
3 months agoSalena
3 months agoLai
4 months agoDestiny
4 months agoVallie
4 months agoCarylon
4 months agoGenevive
4 months agoLoreen
5 months agoJenifer
5 months agoEun
5 months agoAudry
5 months agoLorrine
5 months agoAudria
6 months agoJeanice
6 months agoJuan
6 months agoJill
6 months agoMicheline
6 months agoAnnamaria
7 months agoTiara
7 months agoRefugia
7 months agoJolanda
7 months agoEugene
7 months agoErnest
8 months agoLouisa
8 months agoDelsie
8 months agoJuliann
10 months agoGennie
10 months agoDonte
11 months agoDorcas
11 months agoXenia
11 months agoJody
12 months agoShizue
12 months agoWeldon
1 years ago