Which of the following types of trust models is used by pki

Assignment Help Management Information Sys
Reference no: EM132186973

Answer the following Questions :

What term is directly related to customer privacy considerations?

a. Information classification

b. Data handling policies

c. Clean desk policies

d. Personally identifiable information

A distributed denial of service attack can best be described as:

a. Invalid characters being entered into a field in a database application

b. Multiple attackers attempting to gain elevated privileges on a target system

c. User attempting to input random or invalid data into fields within a web browser application

d. Multiple computers attacking a single target in an organized attempt to deplete its resources

Which of the following is an authentication service that uses UDP as a transport medium?

a. LDAP

b. TACACS+

c. RADIUS

d. Kerberos

Which of the following is a security risk regarding the use of public P2P as a method of collaboration?

a. Limiting the amount of necessary space for data storage

b. Monitoring data changes induces a higher cost

c. Data integrity is susceptible to being compromised

d. Users are not responsible for data usage tracking

The following are encryption types except:

a. File and folder

b. RADIUS

c. Full disk

d. SMIME

Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?

a. PKI

b. ACL

c. CA

d. CRL

What type of malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-up based on browsing habits?

a. Adware

b. Virus

c. Rootkit

d. Botnet

Which of the following types of trust models is used by PKI?

a. Transitive

b. Decentralized

c. Open source

d. Centralized

Of the following, what risk concept requires an organization to determine the number of failures per year?

a. MTBF

b. SLE

c. Quantitative analysis

d. ALE

Which of the following types of logs could provide clues that someone has been attempting to compromise the SQL server database?

a. SQL_LOG

b. Event

c. Security

d. Access

Without validation, a user's input and application becomes vulnerable to all of the following except:

a. Spear phishing

b. Buffer overflow

c. Command injection

d. SQL injection

Which of the following offerings typically allows the customer to apply operation system patches?

a. Cloud based storage

b. Infrastructure as a service

c. Software as a service

d. Public clouds

When you are verifying file integrity on a remote system that is bandwidth limited, which of the following tool combinations provides the strongest confidence?

a. MD5 and SHA-1

b. MD5 and 3DES

c. SHA-256 and RSA

d. SHA-256 and AES

What is a requirement when implementing PKI if data loss is unacceptable?

a. Certificate revocation list

b. Non-repudiation

c. Key escrow

d. Web of trust

Kerberos and LDAP are commonly used for which of the following?

a. To store usernames and passwords for Federated Identity

b. To sign SSL wildcard certificates for subdomains

c. To utilize single sign-on capabilities

d. To perform queries on a directory service

Which of the following is another name for a symmetric key used to exchange a shared secret to begin communication securely?

a. Private key

b. Public key

c. Session key

d. Digital signature

Mandatory vacation is a security control which can be used to uncover which of the following?

a. Fraud committed by a system administrator

b. Software vulnerabilities in vendor code

c. The need for additional security staff

d. Poor password security among users

You are walking into your building when you are asked by another employee to let you into the building because they lost their badge. What does this describe?

a. Whaling

b. Impersonation

c. Tailgating

d. Shoulder surfing

You have implemented an array of four servers to accomplish one specific task. This is best known as what?

a. RAID

b. Clustering

c. Virtualization

d. Load balancing

Fundamental information security principles include confidentiality, availability, and which of the following?

a. The ability to secure data against unauthorized disclosure to external sources

b. The capacity of a system to resist unauthorized changes to stored information

c. The characteristic of a system to provide uninterrupted service to authorized users

d. The confidence with which a system can attest to the identity of a user

As an administrator you wish to hide the network addresses of internal network when connecting to the internet. What is the most effective way to mask the network address the users would be passing the traffic through is?

a. NIPS

b. NAT

c. Stateful firewell

d. Packet-filtering firewall

As a security administrator, you want to replace your RADIUS authentication with a more secure protocol that can use EAP. Which is the best fit for your project?

a. Diameter

b. CHAP

c. Kerberos

d. SAML

What device monitors network traffic in a passive manner?

a. Firewall

b. IDS

c. Web browser

d. Sniffer

Of the following, which will provide the strongest encryption?

a. RSA with a 1024-bit key

b. AES with a 256-bit key

c. DES with a 56-bit key

d. Random one-time pad

Which of the following must a security administrator implement to isolate public facing servers from both the corporate network and the internet?

a. IPSec

b. NAC

c. NAT

d. DMZ

Reference no: EM132186973

Questions Cloud

Functions carried out in daily operations of organization : Describe at least three characteristics that help differentiate projects from other functions carried out in the daily operations of the organization.
Describe the transnational media business environment : Describe the transnational media business environment as characterized in the textbook. What assumptions and/or misconceptions exist in this industry?
Usefulness and limitations of the monetary policy : Briefly describe the usefulness and limitations of the monetary policy tools of the Federal Reserve System.
Expect to happen to the money supply : Explain what we would expect to happen to the money supply if the Federal Reserve buys $5.5 million worth of U.S. Government bonds
Which of the following types of trust models is used by pki : Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?
What are the advantages of customer based pricing : What are the advantages of customer based pricing. How would you manage demand in a pure service industry? What method would you use to predict the demand.
Pay for expedited handling : If you are willing to pay for expedited handling, you can be paid in one month. Would you be willing to pay $50? $100? $200? More?
The benefits of change management : Develop an argument to your manager on the importance of change management.
Describe the physical development of the child : Describe the physical development of the child. Explain if their development matched (or does not match) the statistics in your textbook?

Reviews

Write a Review

Management Information Sys Questions & Answers

  The rise of mobile and e-commerce

Given the rise of mobile and e-commerce, discuss how these will be integrated into your business.

  Develop a proposal for implementing it security management

Utilizing your comprehensive Security plan outline, develop a proposal for implementing IT Security Management.

  Cio and implementing changehow is the cio responsible for

cio and implementing changehow is the cio responsible for implementing change in the business units? what role should

  Compare the performance of the two projects

Analyze and compare the performance of the following two projects in terms of cost, schedule, and efficiency. Make sure to show your calculations and analyze and explain the results

  How process and business strategic decisions

How process and business strategic decisions can be made together

  Identify and evaluate the conflict resolution techniques

Identify and evaluate at least three (3) conflict resolution techniques that can be used by the agile coach to change the dynamics.

  Provide a rationale for your test plan components

You want to have your security team perform penetration testing as part of vulnerability testing on your current systems.

  What are the major functions of each of these devices

What are the major functions of each of these devices - What factors might determine how we select which ones are appropriate for our organization?

  A contract for the purchase of a technology system

Write a paper discussing the three areas typically addressed in a contract for the purchase of a technology system.

  Determine interconnectivity the four it business management

Distributed computing sent shock waves through IT and system management from which IT has yet to fully recover. Industry analysts, system management vendors, niche vendors, and IT management all have perspectives on partial solutions, but none of ..

  Identify three aspects of portfolio management

Identify three aspects of portfolio management that allow the CIO to strategically align IT with organizational goals-discuss why these aspects are important.

  Ethical issues in information systems

Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd