Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

# Questions Answers 1 Please circle different types of Cyberattacks: A) Man in the Middle B) Ninja C) Phishing D) All 2 Window 95 supported

#

Questions

Answers

1

Please circle different types of Cyberattacks:

  1. A) Man in the Middle B) Ninja C) Phishing D) All

2

Window 95 supported TCP/IP. What is TCP/IP stands for

  1. Transit Control Principle/International Protocol B) Transmission control protocol/Internet protocol C) Transmission Integrity Protocol/International Protocol D) None

3

A virtual server is a server that shares:

  1. Hardware and software resources with other operating systems (OS) B) Share Hardware and Memory resources C) Hardware and software resources with one type of operating systems (OS)

4

In 1991 Computer Science graduate at University of Helsinki developed an Operating System Linux based on:

  1. Unix B) LINUX C) Xenix D) Windows 3.x E) None

5

What is the purpose of HIPAA act?

  1. Higher education protection B) Provides data privacy and security to protect medical information. C) Health Insurance and protection for all US Adults

6

On May 2000 a virus I Love You released by student of:

  1. USA B) Russia C) Philippines D) Nigeria E) None

7

2000 Sabranes-Oxley Act is?

  1. A federal law that regulate medical industry B) A federal law that established auditing and financial regulations for public companies. C) A federal law that protect credit card data and other sensitive information for students.

8

From 2005-2007 TJ-Maxx data breached happened due to:

A) Internal IT Employees stealing and selling data B) Inadequate backup and storage of data C) Inadequate security of computer system which processed credit card payment D) All

9

What are the best practices to secure your login credentials?

  1. Use long sentence as a password B) Use 2FA (2 factor authentication) C) Use strong password D) All

10

What is industry best practices to secure system?

  1. Dont allow end users access the system at night or weekend B) Replace system with new one every 5 years. C) Dont connect the system with Internet. D) Update system regularly with secure patch/update.

11

The UNIX operating system was first developed under the name of:

  1. Linux b) Xilinx C) Windows NT D) UNIVAC e) None

12

The T.J. Maxx case is significant for the study of ____________ __________ and its relationship with other professions because its security breach is extensively documented.

  1. Retail business B) Market trend C) Information Security D) All

13

The process of converting information or data into a code, especially to prevent unauthorized access known as:

  1. Coding B) Coding via SSL certificate C) Encryption D) De-encryption

14

System administration includes the installation, configuration, of network equipment like :

  1. Switches B) Routers C) DNS Servers D) None E) All

15

Encryption as a Cryptographic transformation of data to produce _____________

  1. A) CipherText B) Plain Text C) CaesarText D) All

16

Asymmetric Encryption is a form of Encryption where keys come in ____________. Asymmetric Encryption is also known as ___________________.

  1. A) Single B) Pairs C) Public Key Cryptography D) Single Key Cryptography

17

Who is the first line of defense of all three dimension of Information security?

  1. Security officer b) Security analyst c) Database Administrator d) None

18

CIA stands for: ______Confidentiality_____, _________Integrity __________, _____Availability_____________. (Fill the blank)

19

Software update is the act of replacing defective _______________components with components in which the identified defects have been removed.

  1. Infrastructure Components B) Software C) Virtual Server

20

Ciphertext is the text that is ___________________ to the reader.

  1. A) Unintelligible (meaningless) B) Far away C) Meaningful D) All

21

SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a ____________ and _________.

A) Browser and User B) Web Server and Database C) Web Server and Browser D) All

22

What stands for:

  1. Iaas(Infrastructure as a Service)____________ b) Saas __Software as a Service___________________ c) Paas________(Platform as a Service)_________

Fill the blanks.

24

Basic Information Security Model has four components 1) Assets 2) ______Vulnerability_____________________

3) Threats 4)_______Control______. (Fill the blanks.)

25

In the context of Information Security an Assets is defined as ____________________ that is to be protected.

  1. Valuable information B) Resource or Information C) Part of organization d) Non

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Fundamentals Study Guide

Authors: Dr. Sergio Pisano

1st Edition

B09K1WW84J, 979-8985115307

More Books

Students also viewed these Databases questions

Question

What is the managerial capacity problem?

Answered: 1 week ago

Question

What is DDL?

Answered: 1 week ago