Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 12.00

SEC 280 - Quiz - Week - 1

Question posted by
Online Tutor Profile
request

 

Question 1.

Question :

(TCO 1) What is the most common threat to information security in an organization?

 

Student Answer:

XXXX

 

Power surges

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

 

SPAM

 

Instructor Explanation:

Page 7

 

Points Received:

3 of 3

 

Comments:

 

 

Question 2.

Question :

(TCO 1) Background checks, drug testing, retirement, and termination are elements found in what type of policy?

 

Student Answer:

XXXXX

 

Human resources

 

Equal opportunity

 

XXX

 

Instructor Explanation:

Pages 40-42

 

Points Received:

3 of 3XXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXX

Comments:

 

 

Question 3.

Question :

(TCO 1) The term hacktivist refers to _____.

 

Student Answer:

XXXX

 

a hacker with low technical ability

 

a hacker motivated by a political agenda

 

a hacker who can wriXXXXXXXXXXXXXXXXXXXXte scripts

XXXXXXXXXXXX

Instructor Explanation:

Page 11

 

Points Received:

3 of 3

 

Comments:

 

 

Question 4.

Question :

(TCO 1) What is a Solar Sunrise?

 

Student Answer:

An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel

 

Electronic interference resulting from solar flares and occurring most commonly in the early morning hours

 

A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures

 

The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice

 

Instructor Explanation:

Page 3

XXXXXXXXXXXXXXXXXXXXXXXXXXX

Points Received:

3 of 3

 

Comments:

 

 

Question 5.

Question :

(TCO 1) What was the Slammer Worm or Virus?

 

Student Answer:

It was a macro virus that spread by e-mailing the first 50 people in the victim's address book with the subject "Important Message."

 

It was the first Internet worm to slam the Internet and was created by a graduate student from Cornell University in 1988.

 

It was malware that exploited the Microsoft SQL server and spread across the world in just 10 minutes.

 

It was malware that slammed shut your computer by not allowing you to log in.

 

Instructor ExplanatioXXXXXXXXXXXXXXXXXXXn:

Page 5

 

Points Received:

3 of 3

 

Comments:

 

 

Question 6.

Question :

(TCO 1) When information is disclosed to individuals who are not authorized to see it, a _____ has been suffered.

 

Student Answer:

loss of confidentialityXXXXXXXXXXXXXXXX

 

loss of integrity

 

loss of functionality

 

loss of availability

 

Instructor Explanation:

Page 14

 

Points Received:

3 of 3

 

Comments:

 

 

Question 7.

Question :

(TCO 1) In April 2009, Homeland Security Secretary Janet Napolitano told reporters that _____.

 

Student Answer:

organized crime members made attempts to break into the U.S. electric power grid

 

hacktivists made attempts to break into the U.S. electric power grid

 

terrorists made attempts to break into the U.S. electric power grid

 

China and Russia made attempts to break into the U.S. electric power grid

 

Instructor Explanation:

Page 5

 

Points Received:

3 of 3

 

Comments:

 

 

Question 8.

Question :

(TCO 1) The first step an administrator can take to reduce possible attacks is to _____.

 

Student Answer:

ensure that all patches for the operating system and the applications are installed

 

install a firewall

 

install antispyware software

 

configure an intrusion-detection system

 

Instructor Explanation:

Page 13

 

Points Received:

3 of 3

 

Comments:

 

 

Question 9.

Question :

(TCO 1) Which of the following is a security model that addresses integrity?

 

Student Answer:

Biba

 

Bell-LaPadula

 

Layered defense

 

Ring

 

Instructor Explanation:

Page 42

 

Points Received:

3 of 3

 

Comments:

 

 

Question 10.

Question :

(TCO 1) The hacker was successful in breaching the firewall, the packet filtering router, and the internal firewall but was quickly detected and unable to get past the workstation personal firewall. This is an example of what principle?

 

Student Answer:

Layered security

 

Job rotation

 

Diversity of defense

 

Security through obscurity

 

Instructor Explanation:

Pages 26-27

 

Points Received:

3 of 3

 

Comments:

 

 

Available Answer
Other Similar Questions
User Profile
NUMBE...

SEC 280 - Quiz - Week - 6A+

Question 1. Question : (TCO 3) A _____ is a software or hardware device used to observe traffic as it passes through a network on shared broadcast media. Student Answer: logic bomb network sniffer backdoor trap...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 5A+

Question 1. Question : (TCO 6) A newer portable media that provides new obstacles is a(n) _____. Student Answer: access token USB drive CD-ROM CCTV Instructor Explanation: Page 186 Points Re...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 4A+

Question 1. Question : (TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. ...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 2

Question 1. Question : (TCO 2) Which of the following is not an example of a poor security practice? Student Answer: The user does not follow established security policies or processes. There is a lack of security ...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 1

Question 1. Question : (TCO 1) What is the most common threat to information security in an organization? Student Answer: XXXX Power surges Forgotten passwords SPAM Instructor Explanation: Page 7 Points ...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35