The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 5 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
I need assistance with these questions, they will help me prep for my final next week; thank you.
Â
Answer Table
|
1 |
 |
|
2 |
 |
|
3 |
 |
|
4 |
 |
|
5 |
 |
|
6 |
 |
|
7 |
 |
|
8 |
 |
|
9 |
 |
|
10 |
 |
|
11 |
 |
|
12 |
 |
|
13 |
 |
|
14 |
 |
|
15 |
 |
|
16 |
 |
|
17 |
 |
|
18 |
 |
|
19 |
 |
|
20 |
 |
|
21 |
 |
|
22 |
 |
|
23 |
 |
|
24 |
 |
|
25 |
 |
Â
TRUE/FALSE QUESTIONS:
1.   In general, an employer is allowed to see what is on an employee’s computer while working in the workplace.
2.   One of the weaknesses of the DAC (discretionary access control) in SQL is that it does not facilitate management of access rights.
3.   if a service has inherent vulnerabilities and that service is moved from a non-virtualized server to a virtualized server, the service is still just as vulnerable to exploitation
4.   The security of a full virtualization is dependent only on the security of the hypervisor.
5.   In Unix-like systems, user-level activities are implemented by running processes.
Â
MULTIPLE CHOICES QUESTIONS
6.   Which of the following is not a federal law that addresses privacy, confidentiality and security
a.   HIPAA
b.   SAMHSA
c.   FDCA
d.   CAA
Â
7.   Each level entity in the OSI Layered architecture exchanges information with three other entities. Which of the following entities is not part of this exchange?
a.   The layer above the current layer (if it exists)
b.   The layer below the current layer (if it exists)
c.   The user application layer
d.   The peer layer in another machine
Â
8.   What are the major disadvantages of the layered approach to protocols?
a.   The potential for increased communications overhead                         Â
b.   The potential for increased processing at each node
c.   The impact on transmission unit length
d.   All of the above
Â
9.   The file system that comes with your computer is________.
a.   A very primitive kind of database management systems          Â
b.   A very advances kind of database management systems
c.   Not even close to a database management system
d.   Exactly like a database management system
Â
10. A database management system is adequate if it has the following properties
a.   atomicity                         Â
b.   consistency
c.   durability
d.   all of the above
Â
11. In a relational database system, Entity Integrity requires that no tuple in a relation instance can have NULL (undefined) values for any of the__________
a.   Foreign key attributes
b.   Primary key attributes
c.   Candidate key attributes.
d.   All of the above
Â
12. Which of the following is a Windows 10 operating systems feature?
a.   Eliminate entire classes of vulnerabilities
b.   Break exploitation techniques
c.   Contain the damage and prevent persistence
d.   All of the above
Â
13. Windows 10 mitigation of security threat includes________
a.   Windows Defender SmartScreen
b.   Credential Guard
c.   Device Guard
d.   All of the above
Â
14. Which of the followings is not a Windows 10 mitigation to protect against memory exploits?
a.   Enterprise certificate pinning
a.   Data execution prevention
b.   SEHOP
c.   ASLR
Â
15. Microsoft Edge has several security features. Which of the followings is not a security feature of MS Edge?
a.   Includes memory garbage collection
b.   Includes heap allocation randomization
c.   Simplifies security configuration tasks
d.   Designed as a universal windows app
Â
16. Which of the following is a security feature of Windows 8?
a.   Malware resistance
b.   Data protection
c.   Access control
d.   All of the above
Â
17. Which of the following is not a primary form of network access that is offered by hypervisors?
a.   Media access control (MAC)
b.   Network bridging
c.   Network address translation (NAT)
d.   Host only networking
Â
18. Which of the following is not a server security principle?
a.   simplicity
b.   least privilege
c.   defense in depth
d.   access control
Â
19. Which of the following is a method to secure an operating system?     Â
a.   Patch and update the OS
b.   Harden and configure the OS to address security adequately
c.   Install and configure additional security controls, if needed
d.   All of the above
Â
20. Which of the following is not a type of server backup types?    Â
a.   full
b.   partial
c.   incremental
d.   differential
Â
21. which of the followings is not an access control method?         Â
a.   mandatory
b.   discretionary
c.   role-based
d.   privilege
Â
22. Which of the following is not security threat mitigation?Â
                                                a.     Anti-virus software.
                                               b.     Intrusion detection/prevention systems
                                                c.     encryption
                                               d.     firewall
Â
23. Which of the following is part of the security defensive architecture?   Â
a.   BIOS protection
b.   sandboxing
c.   browser separation
d.   all of the above
Â
24. Which of the following is an activity for malware containment?
a.   Stopping the spread of malware
b.   Preventing further damages to hosts
c.   Both a and b
d.   none of a and b
Â
25. Which of the following is not a runtime defense against buffer overflow?        Â
a.   Executable address space protection
b.   Stack protection
c.   Address space randomization
d.   Guard pages
Â
SHORT ANSWER QUESTION
|
Questions |
Answers |
|
26. List actions you need to take if you've become a victim of identity theft? |
 |
|
27. List three countermeasures to spoofing attacks. |
 |
|
28. Name four common countermeasures to security attack methods. |
 |
|
29. list vital activities for maintaining the security of servers |
 |
|
30. What are the five generation types of firewalls? |
 |
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly