Please follow the instruction below and I need it in APA style
Answer the one question from each assigned section this week (sections 13.1-13.7). Each response should be 1-2 paragraphs in length. Type your numbered answers in a Word document (i.e. Section 13.1 Question 2, etc.). APA formatting is not required. If you use outside sources to support your answers, provide APA-style citations and a reference page.
Answer one of the following from Section 13.1:
- What are some examples of physical security measures you can implement to protect your network?
- Which physical control measure uses mantraps, turnstiles, and double entry doors?
- Who can prevent and react to security breaches?
- Which type of physical security systems establishes controls at each layer to ensure that defeating one level of security does not allow an attacker subsequent access?
- What is the difference between an anti-passback system and photoelectric sensors?
Answer one of the following from Section 13.2:
- What is social engineering? What is the best defense against social engineering?
- What is the difference between Piggybacking and tailgating?
- How can you verify that a website is using HTTPS?
- What is the difference between pretexting and masquerading?
- In which type of social engineering attack does an attacker lie about having authority or use their high status in a company to force victims to provide information?
Answer one of the following from Section 13.3:
- What is the main goal in a Denial of Service (DoS) attack?
- How do DDoS and DRDoS attacks differ?
- What is the difference between a virus and a worm?
- In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations?
- In which type of spoofing are packets intended for the default gateway sent to the attacker instead?
- In which type of session attack does the attacker hijack and use a user’s cookies and uses the cookies?
Answer one of the following from Section 13.4:
- What is a drive-by download?
- What is the difference between MAC flooding and MAC spoofing?
- How does a command injection attack a web application?
- What is the difference between XSS and CSRF/XSRF?
- How does salting the hash protect your network?
- What is the target of ARP spoofing?
- How does a buffer overflow differ from an integer overflow?
Answer one of the following from Section 13.5:
- What is the role of a CA in a PKI?
- What is the subject name within a certificate?
- What does an authentication protocol do?
- How does CHAP protect the password (or shared secret) during the authentication process?
- Which authentication protocol would you choose if you needed to use smart cards?
- What are the two ticket types used with Kerberos? How do tickets make authentication and authorization more efficient?
- What device is required to implement 802.1x authentication?
- What is the difference between a strong and a mutual authentication method?
Answer one of the following from Section 13.6:
- Which protocol is the secure alternative to Telnet?
- What is the difference between SFTP and FTPS?
- Which protocol is added to HTTP for secure Web browsing?
- What improvements does SNMPv3 provide over earlier SNMP versions?
Answer one of the following from Section 13.7:
- How does a remote access VPN differ from a host-to-host VPN?
- With a site-to-site VPN, which devices are configured as the VPN tunnel endpoints?
- What does PPTP use for encryption? What does L2TP use?
- What is the difference between AH and ESP used with IPsec?
- Why are SSL VPNs more likely to be implemented when creating VPNs across the Internet through firewalls that you do not control?