Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 12.00

SEC 280 - Quiz - Week - 2

Question posted by
Online Tutor Profile
request

Question 1.

Question :

(TCO 2) Which of the following is not an example of a poor security practice?

 

Student Answer:

The user does not follow established security policies or processes.

 

There is a lack of security policies, procedures, or training within the user's organization.

 

An employee does not allow a person he or she is talking with to enter a secured area before showing proper credentials.

 

An employee creates one good password and then uses it for all of his or her accounts.

 

Instructor Explanation:

Page 77

 

Points Received:

3 of 3

 

Comments:

 

 

Question 2.

Question :

(TCO 2) An attacker watches people as they enter a building that requires a key card. The attacker waits until she sees someone who appears to be in a rush and has his hands full. She then intercepts the person, makes quick small talk, offers to help him hold what's in his hands while he swipes in, and follows behind. This is an example of _____.

 

Student Answer:

spear phishing

 

pharming

 

piggybacking

 

man trapping

 

Instructor Explanation:

Page 73

 

Points Received:

3 of 3

 

Comments:

 

 

Question 3.

Question :

(TCO 2) What is PKCS?

 

Student Answer:

One of the standards used in implementing a public-key infrastructure

 

A method of private cryptography used by the military

 

A method of encrypting e-mail from the IRS

 

The method of encryption that used a 40 bit encryption key

 

Instructor Explanation:

Pages 156-158

Available Answer
Other Similar Questions
User Profile
NUMBE...

SEC 280 - Quiz - Week - 6A+

Question 1. Question : (TCO 3) A _____ is a software or hardware device used to observe traffic as it passes through a network on shared broadcast media. Student Answer: logic bomb network sniffer backdoor trap...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 5A+

Question 1. Question : (TCO 6) A newer portable media that provides new obstacles is a(n) _____. Student Answer: access token USB drive CD-ROM CCTV Instructor Explanation: Page 186 Points Re...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 4A+

Question 1. Question : (TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. ...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 2

Question 1. Question : (TCO 2) Which of the following is not an example of a poor security practice? Student Answer: The user does not follow established security policies or processes. There is a lack of security ...
User Profile
NUMBE...

SEC 280 - Quiz - Week - 1

Question 1. Question : (TCO 1) What is the most common threat to information security in an organization? Student Answer: XXXX Power surges Forgotten passwords SPAM Instructor Explanation: Page 7 Points ...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35