Jump to content
Sign in to follow this  
Gkoo

Principles Info Sys Security

Recommended Posts

It's that time of year again. Where Gkoo post's part of his Final on xG, and people answer it for him.

 

No, I couldn't find it on google.

No, I did not read the question.

And right now I'm doing 15 essay responses not listed here.

 

3. (TCO 2) A person parks his car by an ATM, sets up a small camera discreetly pointed at ATM keypad, and then pretends to be going through bank papers in his car. This would be an example of _____. (Points : 4)

piggybacking

shoulder surfing

phishing

social engineering

 

6. (TCO 2) What is Certification Authority? (Points : 4)

A third party that issues digital certificates

An auditing firm that ensures encryption security

A certified professional that audits systems for security

A third party that encrypts information for people

 

 

14. (TCO 4) A way of backing up cryptographic keys is by _____. (Points : 4)

making copies in one location

making multiple copies in multiple locations

key archiving

key recovery

 

 

15. (TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one? (Points : 4)

The key should be stored securely.

The key should be shared only with others whom you trust.

Authentication should be required before the key can be used.

The key should be transported securely.

 

17. (TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____. (Points : 4)

confidentiality

integrity

availability

authentication

 

 

18. (TCO 4) Keeping a copy of an encryption key with a trusted third party is known as _____. (Points : 4)

CYA

key escrow

key redundancy

key management

20. (TCO 6) You are building a network and need to connect three different network segments, including the Internet. The device must enforce security policies and perform stateful packet filtering. The device you would use is a _____. (Points : 4)

switch

bridge

router

firewall

 

22. (TCO 8) Centralized monitoring of the health of the network is the function of a(n) _____. (Points : 4)

file server

SNMP

NOC

TOC

 

 

23. (TCO 8) What is the Gramm-Leach-Bliley Act? (Points : 4)

It implements the principle that a signature, contract, or other record may not be deleted.

It denies legal effect, validity, or enforceability solely because it is electronic form.

It addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications.

It makes it a violation of federal law to knowingly use another's identity.

It is a major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals.

 

 

 

 

 

25. (TCO 8) Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature? (Points : 4)

Computer Fraud and Abuse Act

Stored Communications Act

CAN-SPAM Act

Sarbanes-Oxley Act

Share this post


Link to post
Share on other sites

3: Shoulder Surfing

6: a third party that issues digital certificates

15: The key should be shared only with others whom you trust.

 

 

I'll do the rest later

Share this post


Link to post
Share on other sites
3: Shoulder Surfing

6: a third party that issues digital certificates

15: The key should be shared only with others whom you trust.

 

 

I'll do the rest later

 

 

thanks dad!

Share this post


Link to post
Share on other sites

1: farming is the best way to make money

2:evade taxes

3:dont poop in the neighbors lawn

4: give your sister a blow job(hue)

5: all of the above

6: eat 4000 calories of butter in 5 minutes

7: use a condom

8: dont steal from mexicans or they will steal from you

9: make sure that your home is heavily fortified from drunk stoners such as myself

10: and finaly...suck mah dick nigga,.

Share this post


Link to post
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this