SEC 280 - Quiz - Week - 1
- From Business, Accounting
- NUMBER1TUTOR
- Rating : 88
- Grade : A+
- Questions : 0
- Solutions : 0
- Blog : 3
- Earned : $14856.59
Question 1.
Question :
(TCO 1) What is the most common threat to information security in an organization?
Student Answer:
XXXX
Power surges
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
SPAM
Instructor Explanation:
Page 7
Points Received:
3 of 3
Comments:
Question 2.
Question :
(TCO 1) Background checks, drug testing, retirement, and termination are elements found in what type of policy?
Student Answer:
Human resources
Equal opportunity
XXX
Instructor Explanation:
Pages 40-42
Points Received:
3 of 3XXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXX
Comments:
Question 3.
Question :
(TCO 1) The term hacktivist refers to _____.
Student Answer:
XXXX
a hacker with low technical ability
a hacker motivated by a political agenda
a hacker who can wriXXXXXXXXXXXXXXXXXXXXte scripts
XXXXXXXXXXXX
Instructor Explanation:
Page 11
Points Received:
3 of 3
Comments:
Question 4.
Question :
(TCO 1) What is a Solar Sunrise?
Student Answer:
An attack that was made to look like an attack from Iraq but that was actually made by two teenagers from California who got training in Israel
Electronic interference resulting from solar flares and occurring most commonly in the early morning hours
A penetration test conducted by the FBI and other government agencies to test the defenses of government networks and critical infrastructures
The name of a virus that would burn up a hard drive at 6 a.m. on the day of the summer solstice
Instructor Explanation:
Page 3
XXXXXXXXXXXXXXXXXXXXXXXXXXX
Points Received:
3 of 3
Comments:
Question 5.
Question :
(TCO 1) What was the Slammer Worm or Virus?
Student Answer:
It was a macro virus that spread by e-mailing the first 50 people in the victim's address book with the subject "Important Message."
It was the first Internet worm to slam the Internet and was created by a graduate student from Cornell University in 1988.
It was malware that exploited the Microsoft SQL server and spread across the world in just 10 minutes.
It was malware that slammed shut your computer by not allowing you to log in.
Instructor ExplanatioXXXXXXXXXXXXXXXXXXXn:
Page 5
Points Received:
3 of 3
Comments:
Question 6.
Question :
(TCO 1) When information is disclosed to individuals who are not authorized to see it, a _____ has been suffered.
Student Answer:
loss of confidentialityXXXXXXXXXXXXXXXX
loss of integrity
loss of functionality
loss of availability
Instructor Explanation:
Page 14
Points Received:
3 of 3
Comments:
Question 7.
Question :
(TCO 1) In April 2009, Homeland Security Secretary Janet Napolitano told reporters that _____.
Student Answer:
organized crime members made attempts to break into the U.S. electric power grid
hacktivists made attempts to break into the U.S. electric power grid
terrorists made attempts to break into the U.S. electric power grid
China and Russia made attempts to break into the U.S. electric power grid
Instructor Explanation:
Page 5
Points Received:
3 of 3
Comments:
Question 8.
Question :
(TCO 1) The first step an administrator can take to reduce possible attacks is to _____.
Student Answer:
ensure that all patches for the operating system and the applications are installed
install a firewall
install antispyware software
configure an intrusion-detection system
Instructor Explanation:
Page 13
Points Received:
3 of 3
Comments:
Question 9.
Question :
(TCO 1) Which of the following is a security model that addresses integrity?
Student Answer:
Biba
Bell-LaPadula
Layered defense
Ring
Instructor Explanation:
Page 42
Points Received:
3 of 3
Comments:
Question 10.
Question :
(TCO 1) The hacker was successful in breaching the firewall, the packet filtering router, and the internal firewall but was quickly detected and unable to get past the workstation personal firewall. This is an example of what principle?
Student Answer:
Layered security
Job rotation
Diversity of defense
Security through obscurity
Instructor Explanation:
Pages 26-27
Points Received:
3 of 3
Comments: