Saint COm520 module 8 quiz 4

Question # 00063323 Posted By: shortone Updated on: 04/26/2015 06:05 AM Due on: 04/30/2015
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Grade Details - All Questions

Question 1. Question : What is the best response to any security incident?

Student Answer: Contact your local law enforcement agency.

Alert management.

Follow the predefined plan.

Isolate damaged equipment first.

Points Received: 0 of 1

Comments:

Question 2. Question : Why should you never encrypt individual files?

Student Answer: Encrypting files may leave unencrypted versions on disk

Encrypting a file makes it less secure

Encrypting individual files allows attackers to decrypt by comparing files

Encrypting individual files is very slow

Points Received: 0 of 1

Comments:

Question 3. Question : Which term refers to the SDLC’s most important concept that means to break down a software project into phases?

Student Answer: Decomposition

Progressive elaboration

Iterative detailing

Crashing

Points Received: 1 of 1

Comments:

Question 4. Question : Which incident handling step determines the type and possibly the source of an incident?

Student Answer: Containment

Eradication

Recovery

Identification

Points Received: 1 of 1

Comments:

Question 5. Question : When should investigators preserve the chain of custody during an investigation?

Student Answer: When investigating incidents that may result in court proceedings

When investigating incidents that will absolutely result in court proceedings

When investigating all incidents

Only when directed by a law enforcement officer

Points Received: 1 of 1

Comments:

Question 6. Question : Most of the time a CSIRT spends in responding to incidents is spent in which step?

Student Answer: Preparation

Containment

Eradication

Recovery

Points Received: 1 of 1

Comments:

Question 7. Question : Which type of plan protects an organization from critical function interruptions?

Student Answer: DRP

BCP

Recovery plan

Project plan

Points Received: 1 of 1

Comments:

Question 8. Question : What is recommended for implementing secure authentication in Windows?

Student Answer: NTLM

RADIUS

Kerberos

OpenLDAP

Points Received: 1 of 1

Comments:

Question 9. Question : What is the most common location to place a firewall?

Student Answer: Inside the internal network

Outside the internal network

DMZ

WAN

Points Received: 1 of 1

Comments:

Question 10. Question : Which software project scope provides the greatest visibility?

Student Answer: A separate project for each major module in a software application

A single project to develop a complete application

A separate project for each individual program

A single project for a group of related programs

Points Received: 0 of 1

Comments:

Question 11. Question : Many application errors in today’s applications come from problems with database definitions. What are the formal data declarations that database management systems use?

Student Answer: Schemas

Variables

Storage units

Data diagrams

Points Received: 1 of 1

Comments:

Question 12. Question : Why is writing a password down an unsafe practice?

Student Answer: A written password is easier to forget

Users often make mistakes when writing complex passwords

Written passwords are easier for attackers to find

Writing a password down reduces the need to memorize it

Points Received: 1 of 1

Comments:

Question 13. Question : At what point in a software development project should security be included?

Student Answer: At the start of the analysis phase

From the beginning

Code generation

Testing

Points Received: 1 of 1

Comments:

Question 14. Question : Which of the following software tools would an investigator use to acquire evidence from a hard disk

drive?

Student Answer: AIRT

SIFT

RTIR

MBSA

Points Received: 0 of 1

Comments:

Question 15. Question : When does an SDLC phase end?

Student Answer: When the team accepts the deliverables for that phase

At the appointed ending data

When the Configuration Control Board officially closes the phase

When work starts on the subsequent phase

Points Received: 1 of 1

Comments:

Dot Image
Tutorials for this Question
  1. Tutorial # 00059242 Posted By: shortone Posted on: 04/26/2015 06:06 AM
    Puchased By: 4
    Tutorial Preview
    The solution of Saint COm520 module 8 quiz 4-100% correct and graded...
    Attachments
    Saint_COm520_module_8_quiz_4.docx (80.78 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    l...ey Rating Quality assignments at affordable prices 06/29/2016
    sk...l97 Rating User-friendly tutoring service 05/26/2015

Great! We have found the solution of this question!

Whatsapp Lisa