Information Technology > EXAM > SEC280 Principles of Information Systems Security_final exam (All)

SEC280 Principles of Information Systems Security_final exam

Document Content and Description Below

SEC280 Principles of Information Systems Security_final exam Question 1.1. (TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? (Points : 4) Trojan Question 2.2. (TCO 5)... Two tools that can be used to encrypt e-mail are _____. (Points : 4) PGP and SIME Question 3.3. (TCO 5) All of the following techniques help secure IM communications except _____. (Points : 4) using a different user name Question 4.4. (TCO 6) What is the name of the process that controls the access to information based on the sensitivity of that information, whether or not the user operates at the appropriate sensitivity level, and whether the user has the authority to access that information? (Points : 4) MAC Question 5.5. (TCO 6) The access-control model that most closely resembles an organization's structure is _____. (Points : 4) RBAC Question 6.6. (TCO 6) Running Java applets from the Web on your system is considered _____. (Points : 4) a security risk Question 7.7. (TCO 6) Which is more secure? (Points : 4) Server-side scripting Question 8.8. (TCO 6) Which of the following does not enhance the security of the browser? (Points : 4) Browser plug-ins Question 9.9. (TCO 6) Your boss wants you to make company files available to the general public, but she does not want you to have to create user accounts for anyone who wants access to the file transfer. In this case, you should use _____. (Points : 4) FTP Blind FTP SFTP FTPS Question 10.10. (TCO 2) What are the security risks of installing games on an organization's system? (Points : 4) Users can't always be sure where the software came from, and it may have hidden software inside of it. Question 11.11. (TCO 2) Which of the following is the weakest password? (Points : 4) P@$$w0rd Question 12.12. (TCO 8) The law that regulates unsolicited, commercial e-mail is the _____. (Points : 4) CAN-SPAM Act Question 13.13. (TCO 4) Which of the following is not one of the three forms of trust models? (Points : 4) Star Question 14.14. (TCO 4) Once you have properly obtained a digital certificate for a website, _____. (Points : 4) [Show More]

Last updated: 2 years ago

Preview 1 out of 10 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$12.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

50
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 04, 2021

Number of pages

10

Written in

Seller


seller-icon
QUIZ HERO

Member since 3 years

0 Documents Sold

Additional information

This document has been written for:

Uploaded

Sep 04, 2021

Downloads

 0

Views

 50

Document Keyword Tags

Recommended For You

Get more on EXAM »

$12.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·