100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials! $8.99   Add to cart

Exam (elaborations)

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!

 1 view  0 purchase
  • Course
  • Institution

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials! Preventing physical access to a server by an unauthorized individual What is the primary security concern for a system administrator? (10) A user can install a wireless access point so that they can access t...

[Show more]

Preview 2 out of 10  pages

  • November 16, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!

Preventing physical access to a server by an unauthorized individual
What is the primary security concern for a system administrator? (10)
A user can install a wireless access point so that they can access the
organization's network from many different areas.
Which statement describes how an attacker can open up a backdoor? (4)
Stuxnet, Duqu, and Flame
Which attacks represent examples of state-sponsored malware? (1)
Urgency
Time can be manipulated to drive a sense of __________ and prompt shortcuts that
can lead to opportunities for interjection into processes. (4)
Clear Desk Policy
Dan decided to go out to eat lunch and left his laptop, important files and his notebook
all over his desk. When he came back from lunch, his laptop was not working properly
and his notes were gone. What policy did Dan not follow?(4)"
DNSSEC
Lack of trust in DNS and inability to authenticate DNS messages drove what new
protocol into affect in 2008?(9)
Diffie-Hellman (DH)
Which encryption algorithm is one of the more popular asymmetric algorithms in use
today?
Diversity of defense
Which term refers to making different layers of security dissimilar so that even if
attackers know how to get through a system that comprises one layer, they may not
know how to get through a different type of layer that employs a different system for
security? (2)
Integrity
The consequence of a hash function that suffers from collisions is a loss of
__________.
An attacker attempts to find little bits of information that could be useful for an
attack in a target trash can.
Which statement describes how dumpster diving is accomplished? (4)
NAT compensates for the lack of available IP address space.
What is one benefit of Network Address Translation (NAT)? (9)
Vishing is successful because of the trust that individuals place in the telephone
system.
Which statement explains why vishing is successful? (4)
Security through obscurity
Which security concept uses the approach of protecting something by hiding it? (2)
Configuration management
Which term refers to the design and operation of elements to ensure the proper
functional environment of a system? (2)

, Implicit deny
Which security principle states that if you have not specifically been allowed access,
then it should be denied? (2)
Piggybacking
"Melissa is walking to work but does not see a black shadow waiting around the corner
of the facility closer to the door. When she uses her badge to go inside the facility, the
door does not close immediately afterwards and the figure who is right behind her at this
point sneakily goes inside the company without getting caught by security. What type of
poor security practice is this an example of? (4)"
Hybrid-cloud
"You are looking to make a change in the way your system is held. The current system
is in a shared environment, and you want it moved to be locally hosted and maintained.
What is the term for how you would like your system to be held?(10) "
An attacker tries to convince the target to initiate contact and then gets the target
to give up confidential information.
Which statement describes how reverse social engineering is accomplished? (4)
Metropolitan area network
Which term describes a network designed for a specific geographic locality such as a
town or a city? (9)
Security policy
Which term describes a high-level statement produced by senior management that
outlines both what security means to the organization and the organization's goals for
security? (3)
Improper use and/or control over passwords
What is a leading cause of account hijacking? (3)
Spear phishing
A handful of people in the sales department at a company have been receiving multiple
malicious emails a day; the emails contain content tailored to the recipients. What type
of social engineering is this?(4)
System owner
Who is responsible for the determination of policies for a given system? (3)
The Morris Worm
Which Internet worm, released in 1988, is considered to be one of the first real Internet
crime cases? (1)
Caching Proxy
A large organization is looking to reduce it's bandwidth usage and increase
performance. Which type of proxy should it use?(10)
Due Care
"Maggie is trying to catch phishing attempts in DollHouseTech Inc. Among her many
precautions, she decides to scan all received attachments and links embedded in her
email via an anti-malware software provided by her company. She is personally trying to
prevent these attacks for the company and exercising all necessary actions. What is
Maggie's actions an example of? (3)"
Establish policies and procedures dictating the roles and responsibilities all
users, as well as security administrators.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75057 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart