SEC280 Week 1 Quiz latest 2016 september (all correct answers)

Question # 00395865 Posted By: katetutor Updated on: 09/27/2016 02:25 AM Due on: 09/27/2016
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image

1. Question :

(TCO 1) Which of the following is not part of the information security triad?

Confidentiality

Integrity

Availability

Ethics

Question 2. Question :

(TCO 1) Symmetrical encryption uses

one key to encrypt and another key to decrypt.

the same key to encrypt and decrypt.

a certificate authority to manage the keys.

large prime numbers.

Question 3. Question :

(TCO 1) What is the most common name for the first large-scale attack on the Internet, which occurred in November of 1988?

The Code Red Worm

The Morris Worm

The Slammer Worm

The Jester Worm

Question 4. Question :

(TCO 1) What is a solar sunrise?

An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel.

Electronic interference resulting from solar flares and occurring most commonly in the early morning hours.

A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures.

The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice.

Question 5. Question :

(TCO 1) A successful attack on a network may adversely impact security in all the following ways except _____.

loss of confidentiality

loss of integrity

loss of functionality

loss of availability

Question 6. Question :

(TCO 1) The first step an administrator can take to reduce possible attacks is to _____.

ensure that all patches for the operating system and the applications are installed

install a firewall

install antispyware software

configure an intrusion-detection system

Question 7. Question :

(TCO 1) A hacker is anyone who

attempts to break into computers for malicious reasons.

attempts to steal data for any reason.

attempts to take over systems without permission.

All of the above

Question 8. Question :

(TCO 1) Which of the following is considered sensitive information?

Medical records

Driver’s license number

Passport number

All of the above

Question 9. Question :

(TCO 1) To ensure the privacy of your driver’s license number during electronic communications, you want to _____ the data.

hide

encrypt

mask

not print

Instructor Explanation: Lesson 1, Who Are Attackers?

Question 10. Question :

(TCO 1) Date encryption standard (DES) is a(n) _____ algorithm.

masking

encryption

hashing

switching

Dot Image
Tutorials for this Question
  1. Tutorial # 00390964 Posted By: katetutor Posted on: 09/27/2016 02:29 AM
    Puchased By: 4
    Tutorial Preview
    The solution of SEC280 Week 1 Quiz latest 2016 september (all correct answers)...
    Attachments
    SEC280_Week_1_Quiz_latest_2016_september.docx (65.18 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    ka...ar Rating All doubts are cleared easily 08/15/2019
    Ca...890 Rating Perfect work without any grammatical error 04/05/2017

Great! We have found the solution of this question!

Whatsapp Lisa