Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 (1 point) Which of the following are examples of stored data? Please select all that apply. Question 1 options: A) The password login

Question 1 (1 point)

Which of the following are examples of stored data?

Please select all that apply.

Question 1 options:

A)

The password login sent across a network

B)

A website

C)

Data contained within a database

D)

The login program on a website

Question 2 (1 point)

Which of the following is an example of data in transit?

Question 2 options:

A)

Websites stored on a webserver

B)

Data stored in a database

C)

Network data

Question 3 (1 point)

Saved

Stealing an un-encrypted hard disk is considered an attack on confidentiality.

Question 3 options:

A) True
B) False

Question 4 (1 point)

Which of the following example is an attack on confidentiality?

Question 4 options:

A)

Injecting a virus into a software application

B)

Shutting down a search engine website

C)

Wiretapping network data without authorization

Question 5 (1 point)

What are the three primary goals of security?

Please choose three.

Question 5 options:

A)

Integrity

B)

Availability

C)

Confidentiality

D)

Authentication

E)

Authorization

Question 6 (1 point)

Alice agrees to a contract with Bob.

She later refuses to honor the contract.

What security sub-goal is she violating?

Question 6 options:

A)

Authentication

B)

Accountability

C)

Integrity

D)

Non-repudiation

E)

Authorization

Question 7 (1 point)

What are other names for controls that may be used in this course?

Please select all that apply.

Question 7 options:

A)

Threats

B)

Countermeasures

C)

Security mechanisms

Question 8 (1 point)

Which types of vulnerabilities were exploited by the data leaks made by Edward Snowden (2013- 2014) and the Wikileaks by Chelsea Manning (2010)?

Please select all that apply.

Question 8 options:

A)

Technological security vulnerabilities

B)

Physical security vulnerabilities

C)

Personnel security vulnerabilities

Question 9 (1 point)

Which security subgoal is responsible for recording/tracking the activities of any entity?

Question 9 options:

A)

Authentication

B)

Accountability

C)

Non-repudiation

D)

Authorization

Question 10 (1 point)

Which security subgoal requires the use of auditing or logging data about a user's actions?

Question 10 options:

A)

Authentication

B)

Confidentiality

C)

Integrity

D)

Accountability

E)

Availability

Question 11 (1 point)

What security subgoal ensures that an entity cannot deny the occurrence of an event?

Question 11 options:

A)

Accountability

B)

Non-repudiation

C)

Authorization

D)

Authentication

Question 12 (1 point)

All three categories of threats (physical, technological, and personnel) include unintentional and non-malicious threats.

Question 12 options:

A) True
B) False

Question 13 (1 point)

Which of the following statements best captures the concept of defense in depth?

Question 13 options:

A)

Having multiple layers of controls

B)

Ensuring that every computer in an organization has all the latest security mechanisms in place

C)

Securing a computer network

D)

Having multiple versions of the same security applications

Question 14 (1 point)

Which of the following are examples of stored data?

Please select all that apply.

Question 14 options:

A)

Information in a database

B)

Passwords sent across a network

C)

Websites stored on a webserver

D)

The login program on a website

Question 15 (1 point)

Which security goal is supported by hashing?

Question 15 options:

A)

Integrity

B)

Authentication

C)

Availability

D)

Confidentiality

Question 16 (1 point)

The three key goals of security are confidentiality, integrity, and authentication.

Question 16 options:

A) True
B) False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatial Databases With Application To GIS

Authors: Philippe Rigaux, Michel Scholl, Agnès Voisard

1st Edition

1558605886, 978-1558605886

More Books

Students also viewed these Databases questions

Question

2. Who do you disagree with and why?

Answered: 1 week ago