SCI 571 Midterm Exam
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
DeVry SEC <strong>571</strong> <strong>Midterm</strong> <strong>Exam</strong><br />
Click on the link below for the solution:<br />
https://devryfinalexams.com/products/sec-<strong>571</strong>-midterm-exam/<br />
1. Question : (TCO A) What are the three goals of security in computing? For each goal, list two controls<br />
that can be implemented to help achieve that goal.<br />
Question 2. Question : (TCO A) Cite a real-world database situation in which the sensitivity of an<br />
aggregate is greater than that of its constituent values.<br />
Then, cite a database situation in which the sensitivity of an aggregate is less than that of its constituent<br />
values.<br />
Question 3. Question : (TCO B) First, name one advantage and one disadvantage of using TCP as a<br />
transport protocol. Then, name one advantage and one disadvantage of using UDP as a transport<br />
protocol.<br />
Question 4. Question : (TCO C) Describe how asymmetric encryption is used to send a message from<br />
User A to User B that assures data confidentiality, authentication, and integrity. Be specific as to the<br />
keys used and how they achieve the three goals.<br />
Question 5. Question : (TCO B) Which of the following is a correct statement?<br />
Student Answer: IPSec uses symmetrical keys.<br />
TCP Sequence numbers protect against man-in-the-middle attacks<br />
Port scans are of limited use in enumerating systems because they do not participate in authentication.<br />
The nslookup utility can be used to obtain NetBIOS zone transfers.<br />
TLS and Kerberos do not support mutual authentication.<br />
DeVry SEC <strong>571</strong> Final <strong>Exam</strong>
Click on the link below for the solution:<br />
https://devryfinalexams.com/products/sec-<strong>571</strong>-midterm-exam/