1) What is the first step in problem-solving? A) Writing code B) Debugging C) Understanding the problem D) Optimizing the solution Answer: C 2) Which of these is not a step in the problem-solving process? A) Algorithm development B) Problem analysis C) Random guessing D) Testing and debugging Answer: C 3) What is an algorithm? A) A high-level programming language B) A step-by-step procedure to solve a problem C) A flowchart D) A data structure Answer: B 4) Which of these is the simplest data structure for representing a sequence of elements? A) Dictionary B) List C) Set D) Tuple Answer: B 5) What does a flowchart represent? A) Errors in a program B) A graphical representation of an algorithm C) The final solution to a problem D) A set of Python modules Answer: B 6) What is pseudocode? A) Code written in Python B) Fake code written for fun C) An informal high-level description of an algorithm D) A tool for testing code Answer: C 7) Which of the following tools is NOT commonly used in pr...
Fire walling to Protect Systems and Networks
* Firewalls are devices (or sometimes software) that sits on the border between two securities domains and monitor/log activity between them, sometimes avoiding the traffic that can pass between them based on certain criteria.
* For example a firewall router may permit HTTP: requests to pass through to a web server inside a company domain while not allowing telnet, ssh, or other traffic to pass through.
* A common architecture is to place a de-militarized zone, DMZ, which arrange of sits "between" the company domain and the outside world, as shown below. Company computers can extend either the DMZ or the outside world, but outside computers can only extend the DMZ. Perhaps most importantly, the DMZ cannot extend any of the other company computers, so even if the DMZ is breached, the attacker cannot get to the balance of the company network. (In some cases the DMZ may have restricted access to company computers, such as a web server on the DMZ that reqires to query a database on one of the other company computers.)
* Firewalls themselves required to be resistant to attacks, and unfortunately have several vulnerabilities:
o Tunneling, which includes encapsulating forbidden traffic inside of packets that
are allowed?
o Denial of service affects addressed at the firewall itself.
o Spoofing, in which an illegal host sends packets to the firewall with the
return address of an authorized host.
* In extra to the normal firewalls protecting a company internal network from the outside world, there are also some specialized forms of firewalls that have been recently developed:
o A personal firewall is a software layer that guards an individual computer. It may be a part of the operating system or a unique software package.
o An application proxy firewall understands the protocols of a specific service and acts as a stand-in (and relay) for the particular service. For example, and SMTP proxy firewall would take SMTP requests from the outside world, examine them for security concerns, and forward only the "safe" ones on to the real SMTP server behind the firewall.
o XML firewalls examined XML packets only, and reject ill-formed packets. Similar
firewalls exist for other specific protocols.
o System call firewalls protects the boundary between user mode and system mode, and delete any system calls that infringe security policies.