Choose the best answer (one) and give reason in a few sentences for your choice or not choosing others. Please give a reference. To get the full credit, the reason should be in your own words, not a copy from a reference/internet source. Such a copy will be considered plagiarizing
Q2. (4 pts) Which of the following is an example of a comprehensive security strategy? ______
A. We already use encryption, so we are safe.
B. We can detect intrusions with our intrusion detection software and have a firewall. These are supplemented by our use of cryptography.
C. . We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place. Reason: -
(4 pts) Which of the following choices is not part of a suggested information security plan?
A. protection of the information itself at the core
B. hardening of our resources (systems and networks)
C. authentication of those accessing the information
D. Sharing strong passwords Reason: -
Q9 (4 pts) The best trust model for e commerce is _______
A. Public Key Certificates and Certificate Authorities
B. Kerberos
C. PGP Web of Trust
D. A, B, and C E. None.
Reason and reference: -
Q10(4 pts) Hardening of DES cannot be accomplished by encrypting twice by two different keys:
True or False
Reason:
Q11 (5 pts) (APA format, Time New Roman 12 pts type double spaced, 200-250 words)
Compare CAIN and CIA.
Could you suggest any improvement in them?
Answer)
2) C) One such example is : We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place
As and when the security would be understood in the comprehensive way hence a broader understanding of the security is to be considered with respect to economics, human rights, or the environment
3) D. Sharing strong passwords
One should never share the password irrespective of the strength of the password
9) C. PGP Web of Trust
The PGP is otherwise called as the pretty businesses which uses the internet for providing the product in good privacy
10) True
As the double DES has 112 bit key as well as enciphers block of 64 bits. Hence encryption doesn't increase for any double cipher
As per HOMEWORKLIB POLICY a minimum of 1 question can be answered we did 4.
If you like the answer, do hit like.
Hope this answer helps.
Thanks
Choose the best answer (one) and give reason in a few sentences for your choice or...
For each question below select the best answer from those listed and give your reasoning. Your reasoning need only be a sentence or two. It is not enough to get the right answer, you must know why it is the right answer. Question 5 Fred's friend claimed that Canadians tend to be jerks. Fred wondered if that was true, and tested it by checking to see how many Canadian jerks he could think of. Fred's cognitive strategy is ["the availability...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...
Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...