Question
1) What is a security risk of allowing mobile code to execute on a target machine? The time delay from when it is downloaded and
1) What is a security risk of allowing mobile code to execute on a target machine?
| The time delay from when it is downloaded and executed could initiate an asynchronous attack. | ||||||||
| It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated. | ||||||||
| Malware may be included in the downloaded code and infect the target machine. | ||||||||
| It will contaminate files that contain computer code, especially .exe and .com files. 2) In which access control mechanism does the operating system determine the access control permissions for subjects?
|
3) How does multi-factor authentication improve security?
| It denies attacker multiple times. |
| By using biometrics, no other person can authenticate. |
| By using a combination of authentications, it is more difficult to gain access by pretending to be an authorized user. |
| It restricts users to smaller spaces. |
4) Map the definition to the corresponding layer of the OSI model.
A. Application Layer 1. Responsible for co-ordinating communication between systems B. Presentation Layer 2. Responsible for putting data packets into data frames from the layer below C. Session Layer 3. Responsible for availability of intended communication partner D. Transport Layer 4. Responsible for transmitting data from node to node with switching and routing technologies E. Network Layer 5. Responsible for negotiating data transfer syntax F. Datalink Layer 6. Responsible for multiplexing upper-layer applications G. Physical Layer 7. Responsible for providing hardware means for sending and receiving data
| A 7, B 5, C 1, D 6, E 4, F 2, G 3 |
| A 3, B 1, C 5, D 6, E 4, F 2, G 7 |
| A 3, B 5, C 1, D 4, E 6, F 2, G 7 |
| A 3, B 5, C 1, D 6, E 4, F 2, G 7 |
5) Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?
| False negative |
| True positive |
| False positive |
| True negative |
6) Which of the following answers refers to a concept of having more than one person required to complete a given task?
| Separation of duties |
| Acceptable use policy |
| Multifactor authentication |
| Privacy policy |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started