Computer Science > EXAM > SEC 280 Final Exam. (Version 2) Questions And Answers (All)

SEC 280 Final Exam. (Version 2) Questions And Answers

Document Content and Description Below

SEC 280 Final Exam. (Version 2) Questions And Answers. 1. (TCO 5) Unsolicited commercial e-mail is known as _____. (Points : 4) hoax e-mail worm spam spork Question 2.2. (TCO 5) Two tools that ca... n be used to encrypt e-mail are _____. (Points : 4) MIME/S and PGP PGP and S/MIME PSP and MIME/S PGP and SIME Question 3.3. (TCO 5) One of the largest security problems with IM programs is _____. (Points : 4) their inability to share files the lack of support for encryption the lack of support for video the lack of support for hiding online presence Question 4.4. (TCO 6) What is the name of the process that controls access to information based on the sensitivity of that information and whether or not the user is operating at the appropriate sensitivity level and has the authority to access that information? (Points : 4) MAC DAC RBAC RBOC Question 5.5. (TCO 6) A network administrator wants to be sure that when users change their passwords, they do not reuse a previous password. What domain password policy will need to be configured? (Points : 4) Enforce password history Maximum password age Minimum password age Minimum password length Question 6.6. (TCO 6) A network administrator wants to specify the number of days a password must be used before it can be changed again. What domain password policy will need to be configured? (Points : 4) Enforce password history Maximum password age Minimum password age Minimum password length Question 7.7. (TCO 6) Which of the following can a user control on their system? (Points : 4) Cookies Running JavaScript Running ActiveX Selection of hyperlinks Question 8.8. (TCO 6) Which is a 100% secure method to download applications from the Internet? (Points : 4) Signed applets SSH HTTPS None of the above Question 9.9. (TCO 6) SSMTP uses TCP port (Points : 4) 25. 110. 465. 456. Question 10.10. (TCO 2) HTTPS uses TCP port (Points : 4) 433. 443. 344. 434. Question 11.11. (TCO 2) When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called (Points : 4) vishing. telephishing. phreaking. voicing. [Show More]

Last updated: 2 years ago

Preview 1 out of 14 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$15.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

61
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 02, 2021

Number of pages

14

Written in

Seller


seller-icon
Quality Suppliers

Member since 4 years

132 Documents Sold

Reviews Received
14
0
1
0
3
Additional information

This document has been written for:

Uploaded

Sep 02, 2021

Downloads

 0

Views

 61

Document Keyword Tags

More From Quality Suppliers

View all Quality Suppliers's documents »

Recommended For You

Get more on EXAM »

$15.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·