CAS CS 30325

subject Type Homework Help
subject Pages 9
subject Words 1199
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Border management ________.
A) is no longer important because there are so many ways to bypass borders
B) is close to a complete solution to access control
C) Both A and B
D) Neither A nor B
Answer:
What protection can a firm provide for people in the event of an emergency?
A) Not allowing people to go into an unsafe environment
B) Accounting for all staff immediately
C) Both A and B
D) Neither A nor B
Answer:
Backup policies should be audited regularly and include tracing what happens in
samples of data.
page-pf2
Answer:
With basic file deletion, data is ________.
A) recoverable
B) reusable
C) Both A and B
D) Neither A nor B
Answer:
Ensuring appropriate network ________ means preventing attackers from altering the
capabilities or operation of the network.
A) confidentiality
B) integrity
C) availability
D) functionality
Answer:
page-pf3
Companies achieve time synchronization for integrated log files by using ________.
A) the Greenwich mean time protocol
B) the Network Time Protocol
C) Both A and B
D) Neither A nor B
Answer:
________ are failures to report true attack activities.
A) False positives
B) False negatives
C) Both A and B
D) Neither A nor B
Answer:
In a URL, ".." (without the quotes) means ________.
A) move one directory up
B) move one directory down
C) move to the operating system's root directory
page-pf4
D) ignore the last entry
Answer:
Eavesdropping usually is more of a concern for ________ LANs than for ________
LANs.
A) wired, wireless
B) wireless, wired
C) about an equal concern for wired and wireless LANs
D) None of the above
Answer:
________ entails investigating the IT security of external companies and the
implications of close IT partnerships before implementing interconnectivity.
A) Auditing
B) Due diligence
C) Peer-to-peer security
D) Vulnerability testing
page-pf5
Answer:
________ is preferred by U.S. auditors.
A) ISO/IEC 27000 family
B) COSO
C) CobiT
D) PCI-DSS
Answer:
________ is a good option if an attack is aimed at a single server because it keeps
transmission lines at least partially open for other communication.
A) Rate limiting
B) False open
C) Black holing
D) None of the above
Answer:
page-pf6
If a firewall has to drop packets because it cannot keep up with traffic volume, this is
________.
A) good because it will prevent possible attack packets from entering the network
B) bad because valid, non-attack packets will be dropped and this will effectively
created a self-generated DOS attack
C) Both A and B
D) Neither A nor B
Answer:
Following someone through a secure door for access without using an authorized ID
card or pass code is called ________. (Choose the most specific answer.)
A) door hacking
B) social engineering
C) piggybacking
D) shoulder surfing
Answer:
MMCs are administrative used to manage ________ servers.
A) Apple
page-pf7
B) Microsoft
C) UNIX
D) All of the above
Answer:
________ is a family of operating systems that share interoperability at the kernel level.
A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B
Answer:
What type of host may be placed in the DMZ?
A) Public webservers
B) Eternal DNS servers
C) Both A and B
D) Neither A nor B
page-pf8
Answer:
A connection between two programs on different computers is represented by its
________.
A) pair of IP addresses
B) pair of port numbers
C) pair of sockets
D) None of the above
Answer:
To get to the super user account in Windows, the administrator can use the ________
command.
A) RunAs
B) su
C) rlogin
D) None of the above
Answer:
page-pf9
________ is a form of identification that identifies a person as being a member of a
group.
A) RBAC
B) Watch list matching
C) Group ID matching
D) Group acceptance
Answer:
Proving your identity to a communication partner is ________.
A) validation
B) identification
C) authentication
D) certification
Answer:
For watch lists of criminals, a false ________ means that an innocent person is
identified as a criminal.
A) acceptance
page-pfa
B) rejection
C) Both A and B
D) Neither A nor B
Answer:
DDL triggers are used to ________.
A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B.
D) Neither A nor B.
Answer:
Which of the following is one of the effective key lengths in 3DES?
A) 56 bits
B) 100 bits
C) 112 bits
D) None of the above
page-pfb
Answer:
Self-service identity management should be used to change a ________ in the identity
database.
A) password
B) telephone number
C) Both A and B
D) Neither A nor B
Answer:
The most popular public key cipher is RSA.
Answer:
A one-bit field is called a ________ field.
A) binary
page-pfc
B) singlet
C) TCP
D) flag
Answer:
________ security uses 128-bit AES encryption for confidentiality and AES-CCMP for
automatic rekeying.
A) 802.11i
B) WPA
C) WEP
D) None of the above
Answer:
Which is more likely to generate a false acceptance?
A) Verification
B) Identification
C) Both verification and identification are equally likely to generate a false acceptance.
D) None of the above
page-pfd
Answer:
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the
message.
A) the public key
B) Joshua's public key
C) Larry's public key
D) Larry's private key
Answer:
The SNMP ________ command is very dangerous.
A) SET
B) GET
C) Both A and B
D) Neither A nor B
Answer:
page-pfe
In pre-shared key mode, a passphrase should be at least ________ characters long?
A) 8
B) 20
C) 64
D) 100
Answer:
If Directory Server A trusts Directory Server B, Directory Server B trusts Directory
Server C, and Directory Server A trusts Directory Server C, this is ________ trust.
A) Mutual
B) One-way
C) Transitive
D) Intransitive
Answer:
A systems administrator may manage ________.
A) an individual host
page-pff
B) a group of hosts
C) Both A and B
D) Neither A nor B
Answer:
On loading docks, outgoing shipments should be separated from incoming shipments
________.
A) to ensure the segregation of duties
B) to avoid confusion
C) to reduce the risk of theft
D) All of the above
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.