Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which one of the following actions is not done under formal control? (a) Create and terminate the rules or standards created (b) Decide which technical

Which one of the following actions is not done under formal control?

(a) Create and terminate the rules or standards created

(b) Decide which technical tools to be deployed

(c) Establish De-militarized zones and firewalls to the enterprise network

(d) Create a well-structured information flow system within organization

(e) Come up with strategic decisions.

Question 12

Which statement best explains the reason for the fact that technical control is not enough in Information Security Management?

(a) Many data breaches happen due to human error.

(b) Hackers can easily break the next-generation firewalls.

(c) Over-engineered technical systems add more complexity.

(d) Deploying AI-based solutions cost more money

(e) It is impossible to delete all virus in a system

Question 13

What is the correct order of the vulnerability threats that the following example cases belong to?

(i) An insider of the organization alters the existing company records about sales income.

(ii) Inject new messages to the network impersonating a legitimate sender.

(iii) A virus program deletes all the data from a database

(iv) Sniffs encrypted packets by passive monitoring.

(a) Fabrication, Modification, Destruction, Interception

(b) Modification, Fabrication, Disclosure, Destruction

(c) Modification, Fabrication, Destruction, Interception

(d) Disclosure, Fabrication, Destruction, Interception

(e) Fabrication, Interception, Destruction, Disclosure

Question 14

Select the correct order of potential violation of basic principles of security for the following cases

(i) Some sensitive details from over 100000 customer records are altered in a company database.

(ii) A company CEO sends a letter to his employees only with the company letter head and without the signing on it.

(iii) A person tries to impersonate a legitimate customer of retail delivery service through their mobile app.

(a) Confidentiality, Integrity, Authentication

(b) Non-repudiation, Confidentiality, Integrity

(c) Integrity, Non-repudiation, Authentication

(d) Integrity, Confidentiality, Non-repudiation

(e) Integrity, Non-repudiation, Confidentiality

Question 15

Which one of the following is (are) not a modification attack?

(a) An adversary changes the encrypted traffic pattern over a communication network.

(b) An attacker adds forged login links/buttons to an organization’s website to collect user authentication data

(c) An internal staff of an organization alter customer data in unauthorized manner.

(d) Software hackers modify a website/software of an organization which results in additional computational tasks.

(e) Insider from an organization induces faults in their database hard drives with malicious intent.

Question 16

Interception occurs when

(a) Hardware, software, or the data is destroyed

(b) Data is made available or accessible to an unauthorized software

(c) An unauthorized person or application gains access to restricted computer resources

(d) Data is accessed and changed in an unauthorized manner

(e) Computer system becomes unavailable for use

Question 17

Which one of the following statements is(are) true about network system attacks?

(a) Attackers can get a complete control of ongoing communication and replace himself/her self with the sender or receiver.

(b) Attacks such as injecting overloaded network traffic making the systems unavailable to the users can be easily identified.

(c) Eavesdroppers can intercept encrypted messages by passively monitoring the network interfaces.

(d) (a) and (c)

(e) All the above

Question 18

Which one is an act of certification authorities (CA)?

(a) Collect public keys and proof of identities from different entities (person, websites, or ganizations etc.)

(b) Create certificate binding public keys of different entities.

(c) Share the CA’s public keys to decrypt the certificates of entities to get the corresponding public key of an entity.

(d) Only (a) and (b)

(e) All the above

Question 19

Which of the following is True about Biba model?

(a) Biba model control access to the objects in an organization

(b) Person with a certain integrity level clearance cannot read the content from the same integrity level.

(c) Person with lower integrity level clearance can read the content from higher integrity levels.

(d) Integrity levels provided by the Biba model cannot be adjusted once they are defined.

(e) Biba model only allows modifying the data from a higher integrity level by a person from a lower integrity level.

Question 20

Which of the following is True about the security model?

(a) BLP model focuses on who can change the data while Biba model focuses on who can read the data

(b) Lattice model shows the primitive operations can be taken according to a given security model

(c) According to BLP model L1 subject which dominates L2 object has the reading access.

(d) Clark-Wilson model assures users to invoke any transformation procedures.

(e) With the Clark-Wilson models, now the companies can safely reduce the cost of the auditing system.

Step by Step Solution

3.46 Rating (156 Votes )

There are 3 Steps involved in it

Step: 1

Lets go through each question Question 12 The best answer is a Many data breaches happen due to human error Question 13 The correct order is c Modification Fabrication Destruction Interception Questio... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing a risk based approach to conducting a quality audit

Authors: Karla Johnstone, Audrey Gramling, Larry Rittenberg

9th edition

9781133939160, 1133939155, 1133939163, 978-1133939153

More Books

Students also viewed these Computer Network questions