Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Section A (True False) - 30 marks 8. Redundancy is one of the recovery methods in data security breaches Justification: Please tick (V) in the

image text in transcribed

Section A (True False) - 30 marks 8. Redundancy is one of the recovery methods in data security breaches Justification: Please tick (V) in the appropriate boxes for the correct answers. Provide justification for your answers 9. Only ICMP protocol is subjected to DoS attacks Justification: True False 1. In Windows, a username can be in two formats: SAM and AD formats 10. Reflection is an attack where an attacker sends packet to a server or many servers with masqueraded source addresses to jammed network links Justification: Justification: 2. Two forms of Access Control List (ACL) in Windows Operating System are DACL and SACL Justification: 11. Misfeasor is an individual, likely an outsider, not authorized to use the computer and who penetrates a systern's access controls to exploit a legitimate user's account 3. Defensive programming is often called Secure programming Justification: Justification: 4. Software testing is a part of requirement gathering process 12. Host-based IDS monitors single device activity 13. A firewall is inserted between the premises network and the Internet to detect intrusion outside network perimeter Justification Justification: 5. In secure programming, programmers are not allowed to make assumptions to things that are beyond their controls 14. Personal firewall is one type of commercial firewalls to prevent attacks Justification Justification: 6. Whistle-blower is a person who raises a concern about wrongdoing occuring in an organization 15. IT security policy must be independent from senior management Justification: Justification: 7. Security policies protect people within an entire area, faciltiy or building Justification

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

=+2 Why did OBI create Centers of Excellence?

Answered: 1 week ago

Question

Provide examples of Dimensional Tables.

Answered: 1 week ago