Which of the following are the CIA properties? (Select the three correct properties.) Authentication Confidentiality Integ
1.Which of the following are the CIA properties? (Select the three correct properties.)
Authentication
Confidentiality
Integrity
Availability
Identity
Implementation
2. Which of the following is an example of a rule-based security decision?
Locking a car's ignition
Performing a step-by-step security analysis
Applying "security theater"
Trying to outdo a neighbor's security measures
3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?
An attack with a $100 loss that could happen once a week
An attack with a $400 loss that could happen once a month
An attack with a $2000 loss that could happen twice a year
An attack with a $5000 loss that could happen once a year
4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.
5. What is a worm?
Malware
Sends spam
Blocks flow of computer traffic
Denial of service
6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.
Group of answer choices
True
False
7. An attempt by a threat agent to exploit assets without permission is referred to as
Group of answer choices
An attack
A vulnerability
A safeguard
A trade-off
8. The primary element on a computer motherboard that runs programs and makes the computer work is
Group of answer choices
Random access memory (RAM)
An input/output (I/O) circuit
The central processing unit (CPU)
Firmware
9. ____________ flaws in the software, such as finger service, are often exploited.
Group of answer choices
Buffer overflow
Blue screen of death
Shell shock
Windows
10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?
Group of answer choices
Gates
Jobs
Moore
Morris
11. True or False? Not all data is strictly numerical.
Group of answer choices
True
False
12. The __________ board contains slots or sockets for random access memory (RAM).
Group of answer choices
Mother
Father
Daughter
Son
13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).
Group of answer choices
True
False
14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.
Group of answer choices
True
False
15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.
Group of answer choices
Cluster
Permission
Capability
Objects
16. The “X” permission on the file indicates that the user has _________ right.
17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.
Group of answer choices
True
False
18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except
Group of answer choices
C++
PHP
Javascript
Lisp
19. True or False? In a default permit, everything is allowed except sites on the prohibited list.
Group of answer choices
True
False
20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of
Group of answer choices
Single-factor authentication
Two-factor authentication
Three-factor authentication
None of these is correct
21. True or False? Authentication associates an individual with an identity.
Group of answer choices
True
False
22. True or False? Two-factor authentication is using two passwords.
Group of answer choices
True
False
23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.
Group of answer choices
True
False
24. The following are fundamental strategies for authenticating people on computer systems, except
Group of answer choices
Something you know
Something you have
Something you are
Something you make
25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user's fingerprint. Which of the following can we add to implement three separate factors?
Group of answer choices
A file of secret information stored on the user's authorized computers
A PIN entered via a built-in PIN pad
Signature recognition
A process that requires the user's cell phone
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.