Tuesday, May 19, 2020

Infa 610 Final Exam Solutions - 1377 Words

INFA 610 Final Exam Solutions https://hwguiders.com/downloads/infa-610-final-exam-solutions/ INFA 610 Final Exam Solutions Part 1: Short discussion, determine if each of the following questions is true or false and defend your position in a brief discussion if you think it is necessary. Write your answer, T or F, to each question in the following Answer Table. (10 questions at 1.5 points each, 15 points totally) 1. Deleting the browsing history and cookies in a computer system can be the way to completely delete the recently visited sites. 2. A Denial-of-Service attack does not require the attacker to penetrate the target’s security defenses. 3. The biggest advantage of public-key cryptography over†¦show more content†¦1. All of the above. Answer(s): 5. Choose the right statement(s): 1. On change-controlled system, you should run automatic updates to prevent security patches from introducing instability. 1. A malicious driver can potentially bypass many security controls to install malware. 1. It is critical that the operating system be kept as up to date as possible, with all critical security related patched installed. 1. The operating system planning process should consider the categories of users on the system, and the privileges they have. 1. All of the above. Answer(s): 6. Countermeasures against subdomain DNS cache poisoning include which of the following: 7. SPR 8. DNSSEC uses RRSIG and DNSKEY records 9. Firewalls 10. DNSSEC employing a chain of trust 11. All of the above. Answer(s): 7. SELinux implements different types of MAC: ________________________. 1. Role Based Access Controls and Type Enforcement, 2. Multi Level Security, 3. Multi Task Level Security, 4. User Based Access Controls and Format Enforcement 5. None of the above. Answer(s): 8. Protection of a software program that uses a unique, novel algorithm could be legally protected by: 9. A patent 10. A copyright 11. A notary 12. Ethical standards 13. All of the above. Answer(s): 9. Security threats include which of the following: 10. Hurricanes 11. Disgruntled employees 12. Unlocked doors 13. Un-patched

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.