Information Technology > EXAM > SEC280 Principles of Information Systems Security_final exam (All)
SEC280 Principles of Information Systems Security_final exam Question 1.1. (TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? (Points : 4) Trojan Question 2.2. (TCO 5)... Two tools that can be used to encrypt e-mail are _____. (Points : 4) PGP and SIME Question 3.3. (TCO 5) All of the following techniques help secure IM communications except _____. (Points : 4) using a different user name Question 4.4. (TCO 6) What is the name of the process that controls the access to information based on the sensitivity of that information, whether or not the user operates at the appropriate sensitivity level, and whether the user has the authority to access that information? (Points : 4) MAC Question 5.5. (TCO 6) The access-control model that most closely resembles an organization's structure is _____. (Points : 4) RBAC Question 6.6. (TCO 6) Running Java applets from the Web on your system is considered _____. (Points : 4) a security risk Question 7.7. (TCO 6) Which is more secure? (Points : 4) Server-side scripting Question 8.8. (TCO 6) Which of the following does not enhance the security of the browser? (Points : 4) Browser plug-ins Question 9.9. (TCO 6) Your boss wants you to make company files available to the general public, but she does not want you to have to create user accounts for anyone who wants access to the file transfer. In this case, you should use _____. (Points : 4) FTP Blind FTP SFTP FTPS Question 10.10. (TCO 2) What are the security risks of installing games on an organization's system? (Points : 4) Users can't always be sure where the software came from, and it may have hidden software inside of it. Question 11.11. (TCO 2) Which of the following is the weakest password? (Points : 4) P@$$w0rd Question 12.12. (TCO 8) The law that regulates unsolicited, commercial e-mail is the _____. (Points : 4) CAN-SPAM Act Question 13.13. (TCO 4) Which of the following is not one of the three forms of trust models? (Points : 4) Star Question 14.14. (TCO 4) Once you have properly obtained a digital certificate for a website, _____. (Points : 4) [Show More]
Last updated: 2 years ago
Preview 1 out of 10 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 04, 2021
Number of pages
10
Written in
This document has been written for:
Uploaded
Sep 04, 2021
Downloads
0
Views
50
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·