Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it

image text in transcribed
1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it impossible for unauthorized users to access the system. 2) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the time-based model of security, which of the following must be true? A) P 6 B) D 6 C) P 6 D) P> 6 3) In the time-based model of information security, D represents A) the time it takes to respond to and stop the attack. B) the time it takes for the organization to detect that an attack is in progress. C) the time it takes an attacker to break through the various controls that protect the organization's information assets. D) the time it takes to assess threats and select risk response. 4) The steps that criminals take to identify potential points of remote entry is called A) scanning and mapping the target. B) social engineering. C) research. D) reconnaissance. 5) The steps that criminals take to trick an unsuspecting employee into granting them access is called A) scanning and mapping the target. B) social engineering. C) research. D) reconnaissance. 6) Verifying the identity of the person or device attempting to access the system is an example A) authentication. B) authorization. C) identification. D) threat monitoring

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Accounting questions