Question: 1.What are the primary uses of cryptography? a) Data encryption b) Data integrity c) User authentication d) All of the above 2.Hash values are typically

1.What are the primary uses of cryptography?

a) Data encryption

b) Data integrity

c) User authentication

d) All of the above

2.Hash values are typically used with which of the following?

a) Encryption

b) Access Control

c) Intrusion Detection

d) All of the above

3.A perimeter network segment that is physically or logically between internal and external networks that adds an additional layer of network security between the Internet and an organizations internal network. External parties only have direct connections to devices in this rather than to the entire internal network. This provides external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks. The preceding describes what?

a) SSO

b) DMZ

c) Hash Value

d) port mirror

4.What are the components of an IDS?

a) Actuators, Interface Development System, Database

b) Switches, Compilers, File System

c) Memory Devices, I/O system, Analyzers

d) Sensors, Analyzers, User Interface

5.An Intrusion Detection System (IDS) can be described as

a) A sophisticated software solution designed to protect computer systems and networks from unauthorized access and malicious activities. It can identify and respond to known and unknown threats by analyzing the malware signatures

b) Hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding and providing real-time or near-real-time warning of attempts to access system resources in an unauthorized manner

c) A state-of-the-art fitness monitoring device that tracks and analyzes the movements and physical activities of individuals within a designated area. It alerts authorities if it detects suspicious or irregular exercise patterns, indicating a potential intrusion into the fitness facility

d) A cutting-edge vulnerability assessment tool that scans computer networks and systems to identify potential weaknesses and security gaps by conducting audits, analyzing system configurations, application vulnerabilities, and network protocols. After analysis, it reconfigures the system to optimize the security posture

6.What type of deployment approach is described as local, regional, or business units making the decisions for all access choices, provisioning, management, and technology?

a) Decentralized

b) Centralized

c) Federated

d) Distributed

7. What is something an organization can do to protect itself from the threat posed from malware?

a) Ensure that user and server platforms are well managed

b) Establish a formal policy prohibiting the use of authorized software

c) Key staff should regularly participate in security training and awareness events that cover malware

d) Install and appropriately maintain start point defenses

8.A logic bomb can be described as

a) A tool used to attack networked computer systems with a large volume of traffic to carry out a denial-of-service (DoS) attack

b) A program inserted into software by an intruder. A logic bomb lies dormant until a predefined condition is met, at which point the program triggers an unauthorized act

c) A software tool that captures keystrokes on a compromised system

d) A set of tools for generating new viruses automatically

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!