Preview

IS3340 Unit 1 Assessment 1

Satisfactory Essays
Open Document
Open Document
284 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3340 Unit 1 Assessment 1
1) Which of the following is the best description of the defense in depth strategy? B) Using multiple layers of security controls to protect resources.
2) What is the main goal of information security? A) Protect information from unauthorized use.
3) Does turning off a computer make the information it contains secure? D) No, because secure data must still be available to authorized users.
4) Which of the following is the best description of a security control? C) A mechanism that protects a resource
5) Which of the following could be classified as a logical control? A) Firewall
6) Which of the following could be classified as a detective control? D) Log monitor
7) Which of the tenets of information security most directly serves the needs of authorized users? A) Availability
8) Which of the tenets of information security is most related to the “need to know” property? C) Confidentiality
9) Where is the most likely place a database management system would run? B) Server
10) Which Microsoft Windows Server 2008 R2 edition would be most appropriate for large-scale deployment using extensive virtualization? A) Datacenter
11) According to the Microsoft EULA, what is the extent that can be recovered due to a Windows fault? B) The price paid for the software license
12) Which of the following is the best definition of a threat? D) Any action that could lead to damage
13) What worm was released in 2001 and primarily defaced web sites? C) Code Red
14) What term describes a malicious software program that users are tricked into running? A) Trojan horse
15) Which of the following defines the cycle used to address Windows threats and vulnerabilities? B) Discovery-analysis-remediation

You May Also Find These Documents Helpful

  • Satisfactory Essays

    |Instant messaging worms – A worm that can replicate it’s self and uses the user’s buddy list and address book on an instant messaging application to |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    10. Based on your Nmap scan results and initial reconnaissance & probing, what next steps would you perform on the VM server farm and VM workstation targets?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment from readings

    • 1211 Words
    • 5 Pages

    9-15. Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems.…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Good Essays

    What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why?…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The three primary goals of information security are prevention, detection, and recovery. Confidentiality The CIA Triad Integrity Availability Principle Description Confidentiality The fundamental principle of keeping information and communications private and protecting them from unauthorized access.…

    • 5718 Words
    • 23 Pages
    Good Essays
  • Satisfactory Essays

    Security in Computing

    • 498 Words
    • 2 Pages

    c. List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    zxczxczxczzczxcz

    • 511 Words
    • 2 Pages

    Examine three (3) common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.…

    • 511 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Business Strategy

    • 2006 Words
    • 9 Pages

    c. It looks at the threats which have impacted other companies and assumes that they will impact them also the extent of damages.…

    • 2006 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Erp Vendor

    • 375 Words
    • 2 Pages

    6. If the vendor is same then it will follow same style leading to faster deployment and less staff training.…

    • 375 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained.…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Good Essays

    A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.…

    • 1201 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    C – Every establishment, business or organization either big or small must have at least one security guard or even an apprentice or a security camera to secure the entire place. The business must improve their control and security by applying one or two of these precautionary measures because we can’t assure all the time the security of the customers and the business itself.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    I loveyouvirus

    • 828 Words
    • 3 Pages

    The term malicious code is the term used to describe code in any script or software that is intended to cause undesired effects. This can include security breaches, denial of service or damage to a system. Malicious code can also describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, and backdoors. The focus of this project is to describe the effects of a specific type of malicious code that came out in May of 2000 called the “ILOVEYOU” virus.…

    • 828 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    negative aspects

    • 254 Words
    • 2 Pages

    2. Research two different examples of computer viruses and explain how they work and what they do.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays