SE 571 Week 1 Quiz

Published on January 2018 | Categories: Humor | Downloads: 409 | Comments: 0 | Views: 1912
of 1
Download PDF   Embed   Report

1. (TCO A) Describe an organizational information situation where data integrity would be more important than data availability or confidentiality. 2. (TCO A) Which of the following is the strongest password? 3. (TCO A) While our focus in the course is on threats to information systems, this question focuses on the concept of threats, vulnerabilities, and controls as applied to other kinds of systems. Select two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created and assess the effectiveness of these controls giving the justification for your assessment. Your answer does not need to address information security but you need to demonstrate your understanding of the terms: threat, vulnerability, and control. (Note: specific answers to this question are not in the assigned reading material.) 4. (TCO A) To what extent does U.S. Combined Federal Criteria quantitatively and measurably demonstrate the practical effectiveness of the security measures it mandates? In other words, how well does it objectively measure real-world security? How would this influence your use of this standard in a given computing environment? Be sure that your answer addresses quantitative and measureable practical effectiviness. 5. (TCO A) Nmap uses _________________to perform network enumeration 6. (TCO A) One privacy concern about the use of biometric authentication is covert identification. Please briefly define this concern and give an example

Comments

Content

1. (TCO A) Describe an organizational information situation where data integrity would be more important than data availability or confidentiality. 2. (TCO A) Which of the following is the strongest password? 3. (TCO A) While our focus in the course is on threats to information systems, this question focuses on the concept of threats, vulnerabilities, and controls as applied to other kinds of systems. Select two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created and assess the effectiveness of these controls giving the justification for your assessment. Your answer does not need to address information security but you need to demonstrate your understanding of the terms: threat, vulnerability, and control. (Note: specific answers to this question are not in the assigned reading material.) 4. (TCO A) To what extent does U.S. Combined Federal Criteria quantitatively and measurably demonstrate the practical effectiveness of the security measures it mandates? In other words, how well does it objectively measure real-world security? How would this influence your use of this standard in a given computing environment? Be sure that your answer addresses quantitative and measureable practical effectiviness. 5. (TCO A) Nmap uses _________________to perform network enumeration 6. (TCO A) One privacy concern about the use of biometric authentication is covert identification. Please briefly define this concern and give an example

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close