Question

1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the syste
0 0
Add a comment Improve this question Transcribed image text
Answer #1
Question 1 Information security procedures protect information integrity by
Answer Option A- Preventing fictitious transactions
Question 2 There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the time-based model of security, which of the following must be true?
Answer Option D- P>6
Question 3 In the time based model of information security, D represents
Answer Option B- the time it takes for the organisation to DETECT that an attack is in progress
Question 4 The steps that criminals take to identify potential points of remote entry is called
Answer Option A- Scanning and mapping the target
Question 5 The steps that criminals take to trick an unsuspecting employee into granting them access is called
Answer Option B- Social engineering
Question 6 Verifying the identity of the person or device attempting to access the system is an example of
Answer Option A- Authentication
Add a comment
Know the answer?
Add Answer to:
1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • 1. Which of the following questions pertains to maintaining security in an information system? A) Should...

    1. Which of the following questions pertains to maintaining security in an information system? A) Should the information system be shut down once a month to carry out maintenance tasks? B) Should an employee be allowed to delete or access data that another employee inputs into the information system? C) Should the system administrators log all changes made to the data, irrespective of the employee? D) Should the IT department add users to a system or hand over the responsibility...

  • 1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of...

    1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security. Select one: True False 2)Which term below is frequently used to describe the tasks of securing information that is in a digital format? Select one: a. network security b. information security c. logical security d. physical security 3) The ____ Act requires banks and financial institutions to alert customers of...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Note: Questions can have multiple valid answers, hence select all choices that apply. 1. What security...

    Note: Questions can have multiple valid answers, hence select all choices that apply. 1. What security feature ensures that only trusted and approved parties can view a file? a) Availability b) Integrity e) Confidentiality d) Authorization e) None of the above 2. An organization wanting to achieve improved security via diversity should: a) Limit access to information to certain individuals and systems b) Perform extensive types of penetration testing of its networks and systems c) Purchase products from multiple different...

  • The Efficiency of System Usability deals with the following: a. Effectiveness b. Satisfaction c. Cost d....

    The Efficiency of System Usability deals with the following: a. Effectiveness b. Satisfaction c. Cost d. Safety The following measures can protect Web sites and their information a. Not use the internet or web at all - except Facebook b. Construct a separate firewall for the web server c. Lock a computer in a private room The stages in the life cycle of BCP are, except a. Planning b. Analysis c. Maintendance d. Implementation When evaluating the cost of training,...

  • pls i need answers to them DIRECTIONS: For each question below circle the best response among...

    pls i need answers to them DIRECTIONS: For each question below circle the best response among the choices listed 1. True or false: It is allowable under HIPAA to log in to the facility's system under a generic username and password a) True b) False 2. Which of the following is a common way to ensure physical security in the workplace? a) Make sure desk drawers and doors are locked, as appropriate. b) Verify the identification of anyone unknown requesting...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT