Question: 1) What is a security risk of allowing mobile code to execute on a target machine? The time delay from when it is downloaded and

1) What is a security risk of allowing mobile code to execute on a target machine?

The time delay from when it is downloaded and executed could initiate an asynchronous attack.

It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.

Malware may be included in the downloaded code and infect the target machine.

It will contaminate files that contain computer code, especially .exe and .com files.

2) In which access control mechanism does the operating system determine the access control permissions for subjects?

Role-based

Mandatory

Token-based

Discretionary

3) How does multi-factor authentication improve security?

It denies attacker multiple times.

By using biometrics, no other person can authenticate.

By using a combination of authentications, it is more difficult to gain access by pretending to be an authorized user.

It restricts users to smaller spaces.

4) Map the definition to the corresponding layer of the OSI model.

A. Application Layer 1. Responsible for co-ordinating communication between systems B. Presentation Layer 2. Responsible for putting data packets into data frames from the layer below C. Session Layer 3. Responsible for availability of intended communication partner D. Transport Layer 4. Responsible for transmitting data from node to node with switching and routing technologies E. Network Layer 5. Responsible for negotiating data transfer syntax F. Datalink Layer 6. Responsible for multiplexing upper-layer applications G. Physical Layer 7. Responsible for providing hardware means for sending and receiving data

A 7, B 5, C 1, D 6, E 4, F 2, G 3

A 3, B 1, C 5, D 6, E 4, F 2, G 7

A 3, B 5, C 1, D 4, E 6, F 2, G 7

A 3, B 5, C 1, D 6, E 4, F 2, G 7

5) Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?

False negative

True positive

False positive

True negative

6) Which of the following answers refers to a concept of having more than one person required to complete a given task?

Separation of duties

Acceptable use policy

Multifactor authentication

Privacy policy

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!