The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 314 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
 Q1. (4 pts) Information is at the center of security concern ___________________.
A.   networks and systems are impossible to protect adequately
B.    information is the asset with the greatest organizational value
C.    information is the easiest thing to protect
D.   information is the most difficult asset to protect
Reason: -
Q2. (4 pts) Which of the following is an example of a comprehensive security strategy? ______
A.   We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place.
B.    We use anti-virus software and a firewall.
C.    We can detect intrusions with our intrusion detection software, and have a firewall. These are supplemented by our use of cryptography.
D.   We already invested in products so we have it covered.
Reason: -
Â
Q3. (4 pts) What is the basis of the modern cryptography? _________________
A.   the laws of mathematics
B.    manipulation of data
C.    creating disguises for information
D.   none of the above
Reason: -
Â
Q4. (4 pts) ___________________ occurs when a faulty application or system programming allows a program or user to input more data to the buffer than it was designed to handle.
A.   Buffer bombing
B.    Buffer overflow
C.    Social engineering
D.   Inflated buffering
Reason and reference -
Â
Q5. (4 pts) The easiest type of man-in-the-middle attack to accomplish is ______________.
A.   sequence number prediction
B.    dumpster diving
C.    decrypting of packets
D.   re-transmit attack
Reason and reference: -
Â
Q6. (4 pts) Which of the following are properties of information?
A.   It has evolved from data and is processed data.
B.    It has identity.
C.    It can be mathematically manipulated
D.   A and B
E.    A and C
F.     A, B and C
No Reason required
Q7 (4 pts) What is the most important aspect of planning security?
A.   the details of the location
B.    to isolate and understand the object of protection
C.    to understand the surrounding infrastructure
D.   to understand the present capabilities
Reason: -
Q8 (4 pts) Which of the following four choices is not part of a suggested information security plan? Â
A.   protection of the information itself at the core
B.    hardening of our resources (systems and networks)
C.    authentication of those accessing the information
D.   distributing predetermined strong passwords
Reason: -
Q9 The best trust model is _______
A.   Public Key Certificates and Certificate Authorities
B.    Kerberos
C.    PGP Web of Trust
D.   A, B, and C
E.    None.
Reason and reference: -
Q10 Hardening of DES can be accomplished by encrypting twice by two different keys: True or False and why?
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly