Saint COm520 module 8 quiz 4

Grade Details - All Questions
Question 1. Question : What is the best response to any security incident?
Student Answer: Contact your local law enforcement agency.
Alert management.
Follow the predefined plan.
Isolate damaged equipment first.
Points Received: 0 of 1
Comments:
Question 2. Question : Why should you never encrypt individual files?
Student Answer: Encrypting files may leave unencrypted versions on disk
Encrypting a file makes it less secure
Encrypting individual files allows attackers to decrypt by comparing files
Encrypting individual files is very slow
Points Received: 0 of 1
Comments:
Question 3. Question : Which term refers to the SDLC’s most important concept that means to break down a software project into phases?
Student Answer: Decomposition
Progressive elaboration
Iterative detailing
Crashing
Points Received: 1 of 1
Comments:
Question 4. Question : Which incident handling step determines the type and possibly the source of an incident?
Student Answer: Containment
Eradication
Recovery
Identification
Points Received: 1 of 1
Comments:
Question 5. Question : When should investigators preserve the chain of custody during an investigation?
Student Answer: When investigating incidents that may result in court proceedings
When investigating incidents that will absolutely result in court proceedings
When investigating all incidents
Only when directed by a law enforcement officer
Points Received: 1 of 1
Comments:
Question 6. Question : Most of the time a CSIRT spends in responding to incidents is spent in which step?
Student Answer: Preparation
Containment
Eradication
Recovery
Points Received: 1 of 1
Comments:
Question 7. Question : Which type of plan protects an organization from critical function interruptions?
Student Answer: DRP
BCP
Recovery plan
Project plan
Points Received: 1 of 1
Comments:
Question 8. Question : What is recommended for implementing secure authentication in Windows?
Student Answer: NTLM
RADIUS
Kerberos
OpenLDAP
Points Received: 1 of 1
Comments:
Question 9. Question : What is the most common location to place a firewall?
Student Answer: Inside the internal network
Outside the internal network
DMZ
WAN
Points Received: 1 of 1
Comments:
Question 10. Question : Which software project scope provides the greatest visibility?
Student Answer: A separate project for each major module in a software application
A single project to develop a complete application
A separate project for each individual program
A single project for a group of related programs
Points Received: 0 of 1
Comments:
Question 11. Question : Many application errors in today’s applications come from problems with database definitions. What are the formal data declarations that database management systems use?
Student Answer: Schemas
Variables
Storage units
Data diagrams
Points Received: 1 of 1
Comments:
Question 12. Question : Why is writing a password down an unsafe practice?
Student Answer: A written password is easier to forget
Users often make mistakes when writing complex passwords
Written passwords are easier for attackers to find
Writing a password down reduces the need to memorize it
Points Received: 1 of 1
Comments:
Question 13. Question : At what point in a software development project should security be included?
Student Answer: At the start of the analysis phase
From the beginning
Code generation
Testing
Points Received: 1 of 1
Comments:
Question 14. Question : Which of the following software tools would an investigator use to acquire evidence from a hard disk
drive?
Student Answer: AIRT
SIFT
RTIR
MBSA
Points Received: 0 of 1
Comments:
Question 15. Question : When does an SDLC phase end?
Student Answer: When the team accepts the deliverables for that phase
At the appointed ending data
When the Configuration Control Board officially closes the phase
When work starts on the subsequent phase
Points Received: 1 of 1
Comments:

-
Rating:
5/
Solution: Saint COm520 module 8 quiz 4-100% correct and graded