SEC571 2019 January Week 1 Quiz Latest
SEC571 Principles of Information Security and Privacy
Week 1 Quiz
Question 1
(TCO A) Describe an organizational information situation where data confidentiality would be more important than data availability or integrity.
Question 2
(TCO A) Which of the following is the weakest password?
rT%b9
2a$xY60
vG&3n9c
8d$iuR4
%s94Nd6
Question 3
(TCO A) While our focus in the course is on threats to information systems, this question focuses on the concept of threats, vulnerabilities, and controls as applied to other kinds of systems. Select two examples of threats to automobiles for which auto manufactures have instituted controls. Describe the vulnerabilities for which the controls were created and assess the effectiveness of these controls giving the justification for your assessment. Your answer does not need to address information security but you need to demonstrate your understanding of the terms: threat, vulnerability, and control. (Note: specific answers to this question are not in the assigned reading material.)
Question 4
(TCO A) What advantages does authentication with biometrics has over passwords?
Question 5
(TCO A) Network enumeration is used to _______________________.
test for vulnerabilities
determine what service and operating systems are running
determine what exploits have been committed
close security flaws
Question 6
(TCO A) Virtualization is an operating system security technique. In the context of virtualization, explain what hypervisor does.
-
Rating:
/5
Solution: SEC571 2019 January Week 1 Quiz Latest