Gkoo 3 Posted June 25, 2013 It's that time of year again. Where Gkoo post's part of his Final on xG, and people answer it for him. No, I couldn't find it on google. No, I did not read the question. And right now I'm doing 15 essay responses not listed here. 3. (TCO 2) A person parks his car by an ATM, sets up a small camera discreetly pointed at ATM keypad, and then pretends to be going through bank papers in his car. This would be an example of _____. (Points : 4) piggybacking shoulder surfing phishing social engineering 6. (TCO 2) What is Certification Authority? (Points : 4) A third party that issues digital certificates An auditing firm that ensures encryption security A certified professional that audits systems for security A third party that encrypts information for people 14. (TCO 4) A way of backing up cryptographic keys is by _____. (Points : 4) making copies in one location making multiple copies in multiple locations key archiving key recovery 15. (TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one? (Points : 4) The key should be stored securely. The key should be shared only with others whom you trust. Authentication should be required before the key can be used. The key should be transported securely. 17. (TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____. (Points : 4) confidentiality integrity availability authentication 18. (TCO 4) Keeping a copy of an encryption key with a trusted third party is known as _____. (Points : 4) CYA key escrow key redundancy key management 20. (TCO 6) You are building a network and need to connect three different network segments, including the Internet. The device must enforce security policies and perform stateful packet filtering. The device you would use is a _____. (Points : 4) switch bridge router firewall 22. (TCO 8) Centralized monitoring of the health of the network is the function of a(n) _____. (Points : 4) file server SNMP NOC TOC 23. (TCO 8) What is the Gramm-Leach-Bliley Act? (Points : 4) It implements the principle that a signature, contract, or other record may not be deleted. It denies legal effect, validity, or enforceability solely because it is electronic form. It addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications. It makes it a violation of federal law to knowingly use another's identity. It is a major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals. 25. (TCO 8) Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature? (Points : 4) Computer Fraud and Abuse Act Stored Communications Act CAN-SPAM Act Sarbanes-Oxley Act Share this post Link to post Share on other sites
easy 7 Posted June 25, 2013 3: Shoulder Surfing 6: a third party that issues digital certificates 15: The key should be shared only with others whom you trust. I'll do the rest later Share this post Link to post Share on other sites
Gkoo 3 Posted June 25, 2013 3: Shoulder Surfing 6: a third party that issues digital certificates 15: The key should be shared only with others whom you trust. I'll do the rest later thanks dad! Share this post Link to post Share on other sites
DeathGod 12 Posted June 25, 2013 1: farming is the best way to make money 2:evade taxes 3:dont poop in the neighbors lawn 4: give your sister a blow job(hue) 5: all of the above 6: eat 4000 calories of butter in 5 minutes 7: use a condom 8: dont steal from mexicans or they will steal from you 9: make sure that your home is heavily fortified from drunk stoners such as myself 10: and finaly...suck mah dick nigga,. 1 1 Gkoo and Tsuchikure reacted to this Share this post Link to post Share on other sites
Gkoo 3 Posted June 25, 2013 8: dont steal from mexicans or they will steal from you Share this post Link to post Share on other sites