06.10.2016 Views

SEC 280 Week 8 Final Exam

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>SEC</strong> <strong>280</strong> <strong>Week</strong> 8 <strong>Final</strong> <strong>Exam</strong><br />

BUY HERE⬊<br />

http://www.homeworkmade.com/se<br />

c-<strong>280</strong>-week-8-final-exam/<br />

<strong>SEC</strong> <strong>280</strong> <strong>Week</strong> 8 <strong>Final</strong> <strong>Exam</strong><br />

Question 1.1. (TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? (Points : 4)<br />

Question 2.2. (TCO 5) Two tools that can be used to encrypt e-mail are _____. (Points : 4)<br />

Question 3.3. (TCO 5) All of the following techniques help secure IM communications except _____. (Points :<br />

4)<br />

Question 4.4. (TCO 6) What is the name of the process that controls the access to information based on the<br />

sensitivity of that information, whether or not the user operates at the appropriate sensitivity level, and whether<br />

the user has the authority to access that information? (Points : 4)<br />

Question 5.5. (TCO 6) The access-control model that most closely resembles an organization's structure is<br />

_____. (Points : 4)<br />

Question 6.6. (TCO 6) Running Java applets from the Web on your system is considered _____. (Points : 4)<br />

Question 7.7. (TCO 6) Which is more secure? (Points : 4)<br />

Question 8.8. (TCO 6) Which of the following does not enhance the security of the browser? (Points : 4)<br />

Question 9.9. (TCO 6) Your boss wants you to make company files available to the general public, but she<br />

does not want you to have to create user accounts for anyone who wants access to the file transfer. In this<br />

case, you should use _____. (Points : 4)<br />

Question 10.10. (TCO 2) What are the security risks of installing games on an organization's system? (Points :<br />

4)<br />

Question 11.11. (TCO 2) Which of the following is the weakest password? (Points : 4)<br />

Question 12.12. (TCO 8) The law that regulates unsolicited, commercial e-mail is the _____. (Points : 4)<br />

Question 13.13. (TCO 4) Which of the following is not one of the three forms of trust models? (Points : 4)<br />

Question 14.14. (TCO 4) Once you have properly obtained a digital certificate for a website, _____. (Points : 4)<br />

Question 15.15. (TCO 2) PGP uses _____. (Points : 4)<br />

Question 16.16. (TCO 2) HTTPS uses port _____. (Points : 4)<br />

Question 17.17. (TCO 3) Which Transport Layer protocol is connection oriented? (Points : 4)<br />

Question 18.18. (TCO 3) Which protocol is responsible for resolving an IP address to a MAC address? (Points :<br />

4)<br />

Question 19.19. (TCO 3) Which of the following is a valid IP address? (Points : 4)<br />

Question 20.20. (TCO 3) The series of worldwide, interconnected networks is referred to as<br />

the _____. (Points : 4)<br />

Question 21.21. (TCO 3) The network that is an extension of a selected portion of a company's Intranet to<br />

external partners is referred to as the _____. (Points : 4)<br />

Question 22.22. (TCO 6) You are building a network and need to connect five computers in an office. They will<br />

be on the same network segment, and you should be able to perform some security functions, such as port<br />

address security. What device would you use to connect the computers? (Points : 4)<br />

Question 23.23. (TCO 6) The following are steps in securing a workstation except _____. (Points : 4)<br />

Question 24.24. (TCO 6) Which device converts analog signals to digital signals and vice versa? (Points : 4)<br />

Question 25.25. (TCO 6) Which of the following types of access controls would you use to grant permissions<br />

based on the decision of the owner of an object? (Points : 4)<br />

1.) Write a password policy that your company will have to follow to ensure strong passwords.


2.) What is NAT, and what is it used for?<br />

3.) How does PGP works??<br />

4.) List and describe three types of network topologies.<br />

7.) Explain some of the problems with PGP.<br />

9.) What are the four common methods for connecting equipment at the Physical Layer?<br />

13.) What are the different methods of access management (MAC, DAC, and RBAC)?<br />

14.) What are the essential elements of change management?<br />

15.) What laws govern computer access and trespass?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!