SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 314 Weeks Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 28 Nov 2017 My Price 9.00

networks and systems are impossible to protect adequately

 Q1. (4 pts) Information is at the center of security concern ___________________.

A.   networks and systems are impossible to protect adequately

B.    information is the asset with the greatest organizational value

C.    information is the easiest thing to protect

D.   information is the most difficult asset to protect

Reason: -

Q2. (4 pts) Which of the following is an example of a comprehensive security strategy? ______

A.   We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place.

B.    We use anti-virus software and a firewall.

C.    We can detect intrusions with our intrusion detection software, and have a firewall. These are supplemented by our use of cryptography.

D.   We already invested in products so we have it covered.

Reason: -

 

Q3. (4 pts) What is the basis of the modern cryptography? _________________

A.   the laws of mathematics

B.    manipulation of data

C.    creating disguises for information

D.   none of the above

Reason: -

 

Q4. (4 pts) ___________________ occurs when a faulty application or system programming allows a program or user to input more data to the buffer than it was designed to handle.

A.   Buffer bombing

B.    Buffer overflow

C.    Social engineering

D.   Inflated buffering

Reason and reference -

 

Q5. (4 pts) The easiest type of man-in-the-middle attack to accomplish is ______________.

A.   sequence number prediction

B.    dumpster diving

C.    decrypting of packets

D.   re-transmit attack

Reason and reference: -

 

Q6. (4 pts) Which of the following are properties of information?

A.   It has evolved from data and is processed data.

B.    It has identity.

C.    It can be mathematically manipulated

D.   A and B

E.    A and C

F.     A, B and C

No Reason required

Q7 (4 pts) What is the most important aspect of planning security?

A.   the details of the location

B.    to isolate and understand the object of protection

C.    to understand the surrounding infrastructure

D.   to understand the present capabilities

Reason: -

Q8 (4 pts) Which of the following four choices is not part of a suggested information security plan?  

A.   protection of the information itself at the core

B.    hardening of our resources (systems and networks)

C.    authentication of those accessing the information

D.   distributing predetermined strong passwords

Reason: -

Q9 The best trust model is _______

A.   Public Key Certificates and Certificate Authorities

B.    Kerberos

C.    PGP Web of Trust

D.   A, B, and C

E.    None.

Reason and reference: -

Q10 Hardening of DES can be accomplished by encrypting twice by two different keys: True or False and why?

Answers

(5)
Status NEW Posted 28 Nov 2017 07:11 AM My Price 9.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)