Question
# Questions Answers 1 Please circle different types of Cyberattacks: A) Man in the Middle B) Ninja C) Phishing D) All 2 Window 95 supported
# | Questions
| Answers |
1 | Please circle different types of Cyberattacks:
|
|
2
| Window 95 supported TCP/IP. What is TCP/IP stands for
|
|
3
| A virtual server is a server that shares:
|
|
4 | In 1991 Computer Science graduate at University of Helsinki developed an Operating System Linux based on:
|
|
5 | What is the purpose of HIPAA act?
|
|
6 | On May 2000 a virus I Love You released by student of:
|
|
7 | 2000 Sabranes-Oxley Act is?
|
|
8 | From 2005-2007 TJ-Maxx data breached happened due to:
A) Internal IT Employees stealing and selling data B) Inadequate backup and storage of data C) Inadequate security of computer system which processed credit card payment D) All
|
|
9
| What are the best practices to secure your login credentials?
|
|
10 | What is industry best practices to secure system?
|
|
11 | The UNIX operating system was first developed under the name of:
|
|
12 | The T.J. Maxx case is significant for the study of ____________ __________ and its relationship with other professions because its security breach is extensively documented.
|
|
13 | The process of converting information or data into a code, especially to prevent unauthorized access known as:
|
|
14 | System administration includes the installation, configuration, of network equipment like :
|
|
15 | Encryption as a Cryptographic transformation of data to produce _____________
|
|
16 | Asymmetric Encryption is a form of Encryption where keys come in ____________. Asymmetric Encryption is also known as ___________________.
|
|
17 | Who is the first line of defense of all three dimension of Information security?
|
|
18
| CIA stands for: ______Confidentiality_____, _________Integrity __________, _____Availability_____________. (Fill the blank) |
|
19 | Software update is the act of replacing defective _______________components with components in which the identified defects have been removed.
|
|
20 | Ciphertext is the text that is ___________________ to the reader.
|
|
21 | SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a ____________ and _________.
A) Browser and User B) Web Server and Database C) Web Server and Browser D) All
|
|
22 | What stands for:
Fill the blanks. |
|
24 | Basic Information Security Model has four components 1) Assets 2) ______Vulnerability_____________________ 3) Threats 4)_______Control______. (Fill the blanks.)
|
|
25 | In the context of Information Security an Assets is defined as ____________________ that is to be protected.
|
|
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started