COP 21531

subject Type Homework Help
subject Pages 9
subject Words 622
subject Authors Randy J. Boyle, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A technical security architecture should be created ________.
A) annually
B) before a firm creates individual countermeasures
C) before a firm creates a specific countermeasure
D) after each major compromise
Answer:
Prosecutors initiate legal proceedings in ________ cases.
A) civil
B) criminal
C) Both A and B
D) Neither A nor B
Answer:
In IM, all messages pass through a ________ server.
A) relay
B) presence
C) Both A and B
page-pf2
D) Neither A nor B
Answer:
________ are discretionary.
A) Standards
B) Guidelines
C) Both A and B
D) Neither A nor B
Answer:
ICMP Echo messages are often used in ________.
A) IP address scanning
B) port scanning
C) Both A and B
D) Neither A nor B
page-pf3
Answer:
A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt
messages.
A) key
B) cipher
C) plaintext
D) code
Answer:
________ allows a user to authenticate him or herself to the identity management server
once; thereafter, whenever the user asks for access to another server, no additional
logins are required.
A) RSO
B) SSO
C) TSO
D) None of the above
Answer:
page-pf4
IPsec operates at the ________ layer.
A) data link
B) internet
C) transport
D) application
Answer:
________ is the process of obscuring an attackers source IP address.
A) Backscatter
B) Spoofing
C) IP Flood
D) None of the above
Answer:
Companies transmit over the Internet because the Internet ________.
A) is inexpensive
B) is secure
page-pf5
C) Both A and B
D) Neither A nor B
Answer:
Profiling uses ________ to find patterns in a dataset which uniquely identify an
individual.
A) statistical methods
B) algorithms and mathematics
C) All of the above.
D) None of the above
Answer:
Which of the following are benefits of using identity management?
A) Reduced costs
B) Centralized auditing of all an employee's access permission across a firm
C) Both A and B
D) Neither A nor B
page-pf6
Answer:
SLE times APO gives the ________.
A) expected per-event loss
B) expected annual loss
C) expected life cycle loss
D) expected per-event benefit
Answer:
You receive an e-mail that seems to come from your bank. Clicking on a link in the
message takes you to a website that seems to be your bank's website. However, the
website is fake. This is called a ________ attack. (Pick the most precise answer.)
A) social engineering
B) a hoax
C) phishing
D) spear fishing
Answer:
page-pf7
The steps required to issue a new employee a password should be specified in a
________.
A) procedure
B) process
C) Both A and B
D) Neither A nor B
Answer:
Hand geometry recognition is used heavily for ________.
A) PC access
B) watch list access
C) door access
D) server access
Answer:
Nearly all encryption for confidentiality uses ________ encryption ciphers.
A) public key
page-pf8
B) symmetric key
C) hashing
D) None of the above
Answer:
A ________ IDS sends data from many devices at a central management console.
A) centralized
B) distributed
C) fragmented
D) decentralized
Answer:
The dominant type of attacker today is the ________.
A) wizard hacker
B) IT or security employer
C) national government
D) career criminal
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.