Assignment 6-7
Assignment 6-7
ISSUES
1. Question 2 All the Options are Correct But Since PPT Answer is taken into account we
go with TCS.
2. Question 8 The AI Calculation was Correct, but it made accidental rounding and
selecting message.
ASSIGMENT – VII
SELECTED ANSWER PPT AI SLECTED
Q.NO
OP ANSWER ANS SLIDES ANS ANS CONFI
1 B CHEQUE C 5 C C 100%
2 A THE CARD PROCESSING CENTER A 11 & 14 A A 100%
3 D ALL OF THE ABOVE D 16 D D 100%
4 C TCP/IP C 47 C C 100%
TRANSLATES A PAPER-BASED
BUSINESS DOCUMENT TO
5 C ELECTRONIC FORMAT AS PER THE C 58 & 59 C C 75%
REQUIREMENT OF THE OUTBOUND
TRANSLATION SOFTWARE
6 B LEGAL COST B 69 C C 100%
PREPARING AN XML DOCUMENT
7 C FROM EDI DOCUMENT, EXTRACTING C 72 C C 75%
THE DATA FROM AN EDI DOCUMENT
8 C SOFTWARE-AS-A-SERVICE (SAAS) C 112 & 113 C C 100%
9 A PRIVATE CLOUD A 115 C A 100%
10 C WEB SERVICE C 84 C C 100%
ASSIGNMENT - VI
QUESTION 1
Sure! Here’s my analysis of the question and options provided in the image:
Question: I observed that some additional income tax is charged to me. I placed a
complaint with the tax department and got the details of the financial transaction
that led to this additional tax deduction. The security category that best explains
this process is _______.
Sure! Here’s my analysis of the question and options provided in the image:
Explanation: A Denial of Service (DoS) attack is a type of cyber attack that aims
to make a system or network resource unavailable to its intended users by
overwhelming it with traffic or otherwise disrupting its normal functioning. The
Application layer of the TCP/IP protocol stack is responsible for providing end-
user services, such as email, file transfer, and web browsing. In a DoS attack, this
layer is often targeted as it is where the user interacts with the system and where
the most damage can be done.
DDoS attacks can happen at both layer 3 and layer 7 of the OSI model. Layer 3
DDoS attacks target the network layer, while layer 7 DDoS attacks target the
application layer¹.
On the other hand, application layer or layer 7 DDoS attacks refer to a type of
malicious behavior designed to target the “top” layer in the OSI model where
common internet requests such as HTTP GET and HTTP POST occur. These layer
7 attacks are particularly effective due to their consumption of server resources in
addition to network resources².
DDoS attacks can be classified into three categories based on the layers of the OSI
model that they target: application layer attacks, protocol attacks, and volumetric
attacks1.
• Application layer attacks are designed to hit the application itself. They
exploit specific system vulnerabilities so that applications fail to deliver the
desired content to their users. Compared to volumetric and protocol attacks,
application layer attacks require fewer resources to disrupt particular
functions or features of a website. They mimic legitimate user behavior,
making them hard to identify1.
• Protocol attacks exploit weaknesses in the network layer and transport
layer protocols to overwhelm targeted devices or services with a flood of
packets. These attacks can be effective even with a relatively low volume of
traffic, as they can consume all available resources on the targeted device or
service1.
• Volumetric attacks aim to overwhelm the target’s network infrastructure
with a high volume of traffic. This type of attack can be carried out using
various methods, such as amplification attacks, where the attacker exploits
vulnerabilities in network protocols to amplify the amount of traffic sent to
the target1.
Options: a. Data packet, high b. Key, high c. Data packet, low d. Key, low
• Data packet, high/low: The size of the data packet being encrypted or
decrypted does not affect the strength of the cryptographic algorithm. The
strength of the algorithm is determined by the size of the key used to encrypt
and decrypt the data, not by the size of the data itself.
• Key, low: A smaller key size means that there are fewer possible keys that
could be used to encrypt the data, making it easier for an attacker to guess or
brute-force the correct key. As a result, a smaller key size generally means
that the cryptographic algorithm is weaker and less secure.
QUESTION 4
Sure! Here’s my analysis of the question and options provided in the image:
Question: I was getting frequent email communications from my bank for sharing
my personal details and sharing my password to update this information. Upon
sharing, I lost my money. While putting my complaints to the bank, I came to
know that the emails were not from the bank. This type of attack is called:
Hash functions can be used to prevent all of the above scenarios. A hash function
is a mathematical function that takes in an input (or ‘message’) and returns a fixed-
size string of bytes. The output, or ‘hash’, is typically a unique representation of
the input data.
Why Not Other Option: Options a, b and c are all correct individually, but option
d (All of the above) is the most comprehensive answer as it includes all three
scenarios that can be prevented using hash functions.
QUESTION 6
TLS (Transport Layer Security) protocol uses both symmetric and asymmetric key
algorithms to secure communication over a network.
• Symmetric key algorithms: Symmetric key algorithms use the same key
for both encryption and decryption of data. In TLS, symmetric key
algorithms are used to encrypt the data being transmitted between the client
and server once a secure connection has been established.
• Asymmetric key algorithms: Asymmetric key algorithms use a pair of
keys, one for encryption and one for decryption. In TLS, asymmetric key
algorithms are used during the initial handshake process to securely
exchange the symmetric key that will be used to encrypt the data being
transmitted.
Why Not Other Option: Options a and b are both correct individually, but option
c (Both symmetric and asymmetric key algorithms) is the most comprehensive
answer as it includes both types of cryptographic algorithms used in TLS protocol.
Option d (Hashing algorithms) is not correct as hashing algorithms are not used for
encryption or decryption of data in TLS protocol.
Once the symmetric key has been exchanged, it is used for encrypting and
decrypting data sent between the client and server during the communication
session. This is known as symmetric encryption because the same key is used for
both encryption and decryption3.
QUESTION 7
Question: During the TLS protocol the digital certificate verification requires
During the TLS protocol, the digital certificate verification requires the use of the
Certifying Authority’s public key to verify the authenticity of the certificate. The
public key is used to decrypt the digital signature on the certificate, which is
encrypted using the Certifying Authority’s private key. If the decryption is
successful, it means that the certificate is authentic and was issued by the
Certifying Authority.
Why Not Other Option: a. Certifying Authority’s public and private key pair:
This option is incorrect because the private key is not required for the verification
process. b. Certifying Authority’s private key: This option is incorrect because the
private key is not used for verification, but rather for signing the certificate. d.
Certifying Authority’s hash key: This option is incorrect because a hash key is not
used in the verification process.
QUESTION 8
Question: A web server throughput is 19.3 requests per sec. It turns out that server
disk is the bottleneck resource. What is the service demand at the disk?
Explanation: The service demand at the disk can be calculated by dividing the total
service time by the number of requests, which is equal to the throughput of the web
server. In this case, the total service time is 1 second, and the throughput is 19.3
requests per second, so the service demand at the disk is 1/19.3 = 0.05181347
seconds, which is approximately equal to option c, 0.001737 sec. (AI Mistake)
I hope this helps! Let me know if you have any further questions or if you would
like me to recheck my answer.
QUESTION 9
Question: During the execution of TLS protocol, if cached session states are
available at client’s server side and valid, which the following will happen?
Correct Option: a. The time taken to execute handshake protocol will reduce
Explanation: If cached session states are available at the client’s server side and
valid, the time taken to execute the handshake protocol will reduce. This is because
the handshake protocol will not need to be executed again, as the session state
information can be reused, thus reducing the time taken.
Question: Which of the following is the work of Public Key Infrastructure (PKI)
of a country?
I hope this helps! Let me know if you have any further questions or if you would
like me to recheck my answer.
ASSIGNMENT – VII
QUESTION 1
I hope this helps! Let me know if you have any further questions or if you would
like me to recheck my answer.
QUESTION 2
Option:
Explanation:
• The card processing center is responsible for connecting merchants with the
credit card companies.
• It is the intermediary between the merchant and the credit card company.
• It is responsible for processing the credit card transaction and ensuring that
the merchant receives payment.
Thank you for your kind words! I’ll do my best to provide accurate and logical
answers in the E-Business and related domains. Here’s my response following the
process you mentioned:
Question: Why is TLS not suitable for credit card payment transactions?
Option: a. TLS supports mutual authentication between client and server b. TLS
cannot guarantee that the payment information is secured and not misused at the
merchant’s server. c. TLS cannot ensure that the merchant is authorized to get the
payment through the specified credit card. d. All of the above
Explanation:
• TLS is not suitable for credit card payment transactions because it cannot
guarantee that the payment information is secured and not misused at the
merchant’s server.
• TLS also cannot ensure that the merchant is authorized to get the payment
through the specified credit card.
• Additionally, while TLS does support mutual authentication between client
and server, this is not enough to ensure the security of credit card payment
transactions.
QUESTION 4
Option:
• a. REST
• b. EDI
• c. TCP/IP
• d. SOAP
Explanation:
QUESTION 5
Explanation:
• The “Preparation of Electronic Documents” stage during EDI process
translates a paper-based business document to electronic format as per the
requirement of the outbound translation software.
• This means that the paper-based business document is converted into an
electronic format that can be understood by the outbound translation
software, which will then translate it into a standard EDI format for
transmission.
I hope this helps! If you feel that my answer is incorrect or if you have any further
questions,
If you have paper orders, you can still use EDI to process them. The first step
would be to convert the paper orders into an electronic format. This can be done by
manually entering the data into your system or by using a scanning or OCR
(Optical Character Recognition) technology to automatically extract the data from
the paper documents. Once the data is in electronic format, it can be organized and
prepared for the next stage of the EDI process, which is the translation of the
documents into EDI format.
Option:
• a. Consulting cost
• b. Legal cost
• c. Networking cost
• d. Training cost
• a. Consulting cost: This refers to the cost incurred for professional advice or
services, not specifically for the preparation of an EDI Trading Partner
Agreement.
• c. Networking cost: This refers to the cost associated with setting up and
maintaining a network, not specifically for the preparation of an EDI
Trading Partner Agreement.
• d. Training cost: This refers to the cost incurred for training personnel, not
specifically for the preparation of an EDI Trading Partner Agreement.
QUESTION 7
Question: The difference between XMP wrapper and parser is, the former is used
for _____ and the latter is for _____.
Option: a. Preparing an XML document from a database, Extracting the data from
an XML document b. Extracting the data from an XML document, Preparing an
XML document from a database c. Preparing an XML document from EDI
Document, Extracting the data from an EDI document d. Extracting the EDI data
from XML document, Preparing an XML document from an EDI document
Explanation:
• The difference between XMP wrapper and parser is that the former is used
for preparing an XML document from an EDI Document, while the latter is
used for extracting the data from an EDI document.
• This means that the XMP wrapper converts an EDI Document into an XML
format, while the parser extracts the data contained within the EDI
Document.
QUESTION 8
Thank you for your kind words! I’m glad I could help. Here’s the answer to the
question in the image following the process you mentioned:
Option:
Explanation:
• Gmail is a web-based email service that is offered by Google.
• It is an example of a SaaS (Software as a Service) cloud model.
• SaaS is a software delivery model in which a software application is hosted
by a third-party provider and made available to customers over the internet.
• In this model, the provider manages the infrastructure and security, and the
customer accesses the software through a web browser.
QUESTION 9
Sure! Here’s the answer to the question in the image following the process you
mentioned:
Question: Our organization has adopted cloud service hosted in the institute
premises. Since we do not have in-house expertise in managing the cloud, we have
a contract with Google to help us out. Our cloud can be termed as
Option:
• a. Private cloud
• b. Public cloud
• c. Hybrid cloud
• d. Community cloud
Explanation:
QUESTION 10
Thank you for your kind words! I’ll do my best to provide accurate and logical
answers. Here’s the answer to the question in the image you sent, following the
process you mentioned:
Option:
• a. CORBA
• b. XML
• c. Web service
• d. None of the above
Explanation:
• A web service is a software system designed to support interoperable
machine-to-machine interaction over a network.
• It is a standardized way of integrating web-based applications using the
XML, SOAP, WSDL and UDDI open standards over an Internet protocol
backbone.
• Web services allow different applications from different sources to
communicate with each other without time-consuming custom coding.