Com510 final exam 2017 | Computer Science homework help

Computer Science

Question

Question 1 (5 points)

What should you be armed with  computer science   to adequately assess potential weaknesses in each information asset?

Question 1 options:

Intellectual property assessment

Properly classified inventory

List of known threats

Audited accounting spreadsheet

Save

Question 2 (5 points)

Which of the following is a network device attribute that may be used in conjunction with DHCP, making asset-identification using this attribute difficult?

Question 2 options:

IP address

Part number

MAC address

Serial number

Save

Question 3 (5 points)

Which of the following is NOT a valid rule of thumb on risk control strategy selection?

Question 3 options:

When the attacker’s potential gain is less than the costs of attack: Apply protections to decrease the attacker’s cost or reduce the attacker’s gain, by using technical or operational controls.

When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.

When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.

When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.

Save

Question 4 (5 points)

By multiplying the asset value by the exposure factor, you can calculate which of the following?

Question 4 options:

Value to adversaries

Annualized cost of the safeguard

Annualized loss expectancy

Single loss expectancy

Save

Question 5 (5 points)

The Microsoft Risk Management Approach includes four phases. Which of the following is NOT one of them?

Question 5 options:

Implementing controls

Evaluating alternative strategies

Conducting decision support

Measuring program effectiveness

Save

Question 6 (5 points)

What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks?

Question 6 options:

Qualitative assessment of many risk components

Quantitative valuation of safeguards

Subjective prioritization of controls

Risk analysis estimates

Save

Question 7 (5 points)

Which of the following affects the cost of a control?

Question 7 options:

Maintenance

Liability insurance

CBA report

Asset resale

Save

Question 8 (5 points)

Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?

Question 8 options:

Disaster recovery plan

Business continuity plan

Damage control plan

Incident response plan

Save

Question 9 (5 points)

The identification and assessment of levels of risk in an organization describes which of the following?

Question 9 options:

Risk reduction

Risk management

Risk identification

Risk analysis

Save

Question 10 (5 points)

Determining the cost of recovery from an attack is one calculation that must be made to identify risk, what is another?

Question 10 options:

Cost of prevention

Cost of identification

Cost of litigation

Cost of detection

Question 11 (5 points)

Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?

Question 11 options:

Ticket Granting Service

Authentication Server

Authentication Client

Key Distribution Center

Save

Question 12 (5 points)

Which of the following is a commonly used criteria used to compare and evaluate biometric technologies?

Question 12 options:

False accept rate

False reject rate

Crossover error rate

Valid accept rate

Save

Question 13 (5 points)

To move the InfoSec discipline forward, organizations should take all but which of the following steps?

Question 13 options:

Learn more about the requirements and qualifications for InfoSec and IT positions

Learn more about InfoSec budgetary and personnel needs

Insist all mid-level and upper-level management take introductory InfoSec courses

Grant the InfoSec function an appropriate level of influence and prestige

Save

Question 14 (5 points)

Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program?

Question 14 options:

Security technician

Security officer

Security manager

CISO

Save

Question 15 (5 points)

The intermediate area between trusted and untrusted networks is referred to as which of the following?

Question 15 options:

Demilitarized zone

Unfiltered area

Proxy zone

Semi-trusted area

Save

Question 16 (5 points)

Which technology has two modes of operation: transport and tunnel?

Question 16 options:

Secure Sockets Layer

Secure Hypertext Transfer Protocol

Secure Shell

IP Security

Save

Question 17 (5 points)

Which of the following is NOT a typical task performed by the security technician?

Question 17 options:

Develop security policy

Coordinate with systems and network administrators

Configure firewalls and IDPSs

Implement advanced security appliances

Save

Question 18 (5 points)

Temporary hires called contract employees – or simply contractors – should not be allowed to do what?

Question 18 options:

Work on the premises

Wander freely in and out of buildings

Compensated by the organization based on hourly rates

Visit the facility without specific, prior coordination

Save

Question 19 (5 points)

Which tool can best identify active computers on a network?

Question 19 options:

Packet sniffer

Port scanner

Honey pot

Trap and trace

Save

Question 20 (5 points)

Which of the following is typically true about the CISO position?

Question 20 options:

Accountable for the day-to-day operation of all or part of the InfoSec program

Frequently reports directly to the Chief Executive Officer

Technically qualified individual who may configure firewalls and IDPSs

Business managers first and technologists second

Save

Previous PageNext Page

Question 21 (5 points)

The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?

Question 21 options:

For political advantage

For private financial gain

In furtherance of a criminal act

For purposes of commercial advantage

Save

Question 22 (5 points)

There are three general categories of unethical behavior that organizations and society should seek to eliminate. Which of the following is NOT one of them?

Question 22 options:

Intent

Accident

Ignorance

Malice

Save

Question 23 (5 points)

Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls.

Question 23 options:

Persecution

Remediation

Rehabilitation

Deterrence

Save

Question 24 (5 points)

Which of the following is an international effort to reduce the impact of copyright, trademark and privacy infringement, especially via the removal of technological copyright protection measures?

Question 24 options:

DMCA

European Council Cybercrime Convention

U.S. Copyright Law

PCI DSS

Save

Question 25 (5 points)

Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right?

Question 25 options:

Descriptive ethics

Normative ethics

Deontological ethics

Applied ethics

Save

Question 26 (5 points)

Deterrence is the best method for preventing an illegal or unethical activity.

Question 26 options:

True

False

Save

Question 27 (5 points)

Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federal computer system?

Question 27 options:

The Telecommunications Deregulation and Competition Act

National Information Infrastructure Protection Act

The Computer Security Act

Computer Fraud and Abuse Act

Save

Question 28 (5 points)

Which of the following is compensation for a wrong committed by an employee acting with or without authorization?

Question 28 options:

Jurisdiction

Due diligence

Liability

Restitution

Save

Question 29 (5 points)

The Secret Service is charged with the detection and arrest of any person committing a U.S. federal offense relating to computer fraud, as well as false identification crimes.

Question 29 options:

True

False

Save

Question 30 (5 points)

Which entity is not exempt from the Federal Privacy Act of 1974?

Question 30 options:

U.S. Congress

Hospitals

Credit agencies

Bureau of the Census

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
    See full FAQ

    Take your studies to the next level with our experienced specialists

    Chat
    Chat
    Hello, we are online 24/7. Leave a message we will reply instantly