Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 15.00

SEC280 Week2 QuizA++

Question posted by
Online Tutor Profile
request

SEC280 Week2 Quiz        Student ID: D01503743          Name: Justin Fetters
1.    In the Operational Model of Computer Security, which of the following is true?
a.    Protection = Prevention + (Detection + Response)
b.    Protection = Response + (Detection + Prevention)
c.    Response = Protection + (Detection + Prevention)
d.    Prevention = Response + (Detection + Protection)
2.    Which of the following is true when your boss asks you to make sure the company’s website is available 24x7x365?
a.    Integrity
b.    Authentication
c.    Confidentiality
d.    Assurance
3.    Updating antivirus definition file on a server is best described as?
a.    Network Security
b.    Host Security
c.    Physical Security
d.    Social Engineering Security
4.    Which of the following would be best described as Network Security?
a.    Updating a router’s firmware to patch the vulnerability
b.    Run Windows Update on a user’s workstation
c.    Make sure a server cannot use USB drive
d.    Having a firewall deploy on every departments
5.    Most of today’s firewalls are executing rules base on which of the following:
a.    Implicit deny
b.    Implicit allow
c.    Explicit deny
d.    Explicit allow
6.    Which of the following would be one reasons to execute job rotation:
a.    In case one person cannot come to work because of a long term disability.
b.    To encourage the company to hire more employees
c.    To encourage the company to let go more employees
d.    In case one person cannot come to work because a cold.
7.    What is the general purpose of a DMZ?
a.    To prevent the Internet users have a direct access to the internal servers
b.    To prevent internal employees to access Facebook
c.    To prevent the Internet users have a direct access to cloud service servers (i.e., salesforce.com)
d.    To prevent internal employees to send email via Internet mail (i.e., Yahoo mail)
8.    To use username and password to gain an access to a website is:
a.    Authentication
b.    Integrity
c.    Assurance
d.    Nonrepudiation
9.    To make sure the file has not been modify by anyone:
a.    Authentication
b.    Integrity
c.    Assurance
d.    Nonrepudiation
10.    To provide an evidence to prove one is indeed sign the document electronically:
a.    Authentication
b.    Integrity
c.    Assurance
d.    Nonrepudiation

 

Available Answer
Other Similar Questions
User Profile
maste...

SEC280 Week 8 Final Exam (A+++++)

Question 1.1. (TCO 2) When creating a password, users tend to use _____ (Points : 4) all capital letters passwords that are too long names of family, pets, or teams numbers only Question 2.2. (TCO 2) Soci...
User Profile
maste...

SEC280 WEEK 5 QUIZ LATEST 2016

Question 1. Question : (TCO 6) In terms of physical security, _____ refers to protecting important assets by using several perimeters. layered access multifactor access control dual authentication an intrusion-detection syste...
User Profile
maste...

SEC280 Week 3 Quiz latest 2016 (ALL CORRECT)

Question Question 1. Question : (TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the...
User Profile
homew...

SEC280 Week2 Quiz

A. Protection = Prevention + (Detection + Response) b. Protection = Response + (Detection + Prevention) c. Response = Protection + (Detection + Prevention) d. Prevention = Response + (Detection + Protection) 2. Which of the f...
User Profile
NUMBE...

SEC280 Week2 QuizA++

SEC280 Week2 Quiz Student ID: D01503743 Name: Justin Fetters 1. In the Operational Model of Computer Security, which of the following is true? a. Protection = Prevention + (Detection + Response) b. Protection = Respons...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35