STUDYSHIELDS ASSIGNMENT HELP

  • Home
  • Blog
  • Courses
    • Child Category 1
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Services
  • Country
    • Childcare
    • Doctors
  • Home
  • Blog
  • Sample Works
  • Order Now

Saturday, November 20, 2021

Which of the following are the CIA properties?

 November 20, 2021     No comments   

 1.Which of the following are the CIA properties? (Select the three correct properties.)


Authentication


Confidentiality


Integrity


Availability


Identity


Implementation


2. Which of the following is an example of a rule-based security decision?


Locking a car's ignition


Performing a step-by-step security analysis


Applying "security theater"


Trying to outdo a neighbor's security measures


3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?


An attack with a $100 loss that could happen once a week


An attack with a $400 loss that could happen once a month


An attack with a $2000 loss that could happen twice a year


An attack with a $5000 loss that could happen once a year


4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.


5. What is a worm?


Malware


Sends spam


Blocks flow of computer traffic


Denial of service


6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.


Group of answer choices


True


False


7. An attempt by a threat agent to exploit assets without permission is referred to as


Group of answer choices


An attack


A vulnerability


A safeguard


A trade-off


8. The primary element on a computer motherboard that runs programs and makes the computer work is


Group of answer choices


Random access memory (RAM)


An input/output (I/O) circuit


The central processing unit (CPU)


Firmware


9. ____________ flaws in the software, such as finger service, are often exploited.


Group of answer choices


Buffer overflow


Blue screen of death


Shell shock


Windows


10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?


Group of answer choices


Gates


Jobs


Moore


Morris


11. True or False? Not all data is strictly numerical.


Group of answer choices


True


False


12. The __________ board contains slots or sockets for random access memory (RAM).


Group of answer choices


Mother


Father


Daughter


Son


13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).


Group of answer choices


True


False


14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.


Group of answer choices


True


False


15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.


Group of answer choices


Cluster


Permission


Capability


Objects


16. The “X” permission on the file indicates that the user has _________ right.


17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.


Group of answer choices


True


False


18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except


Group of answer choices


C++


PHP


Javascript


Lisp


19. True or False? In a default permit, everything is allowed except sites on the prohibited list.


Group of answer choices


True


False


20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of


Group of answer choices


Single-factor authentication


Two-factor authentication


Three-factor authentication


None of these is correct


21. True or False? Authentication associates an individual with an identity.


Group of answer choices


True


False


22. True or False? Two-factor authentication is using two passwords.


Group of answer choices


True


False


23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.


Group of answer choices


True


False


24. The following are fundamental strategies for authenticating people on computer systems, except


Group of answer choices


Something you know


Something you have


Something you are


Something you make


25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user's fingerprint. Which of the following can we add to implement three separate factors?


Group of answer choices


A file of secret information stored on the user's authorized computers


A PIN entered via a built-in PIN pad


Signature recognition


A process that requires the user's cell phone

  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 comments:

Post a Comment

Click Here to Place order

Popular Posts

  • A “criminal minds” Aileen Wournos individual will be your “patient”
     A “criminal minds” Aileen Wournos individual will be your “patient”  A brief history of the patient including diagnoses (documented or your...
  • CEO Jane Lionel has some hard decisions to make with regard to some of the company’
     CEO Jane Lionel has some hard decisions to make with regard to some of the company’solder hands, and even on the eve of that decision, I be...
  • Problem in Supply Chain
    Problem in Supply Chain Problem 2. (Chapter 11: The Storage and Handling System) Compare the constrast private ownership of storage space to...

Recent Posts

Unordered List

Pages

  • Home

Text Widget

Blog Archive

  • November 2022 (20)
  • October 2022 (50)
  • September 2022 (119)
  • August 2022 (107)
  • February 2022 (501)
  • January 2022 (443)
  • December 2021 (488)
  • November 2021 (1574)
  • October 2021 (28)
  • September 2021 (11)
  • July 2021 (8)
  • June 2021 (15)
  • May 2021 (39)
  • April 2021 (15)
  • March 2021 (303)
  • February 2021 (712)
  • January 2021 (903)
  • December 2020 (2)
  • September 2020 (33)
  • April 2016 (5183)
  • March 2016 (3763)
  • February 2016 (4356)
  • January 2016 (1749)
  • December 2015 (22)
  • November 2015 (147)
  • October 2015 (23)

Sample Text

Copyright © STUDYSHIELDS ASSIGNMENT HELP | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates