Reference no: EM132289414
1. Risk is defined as having which of the following (check all that apply):
a. Avoidance of Countermeasure
b. A valuation calculation
c. Conflict with a known enemy
d. Verification of threat
e. The probability of loss or harm
2. Which of the following is not an active attack against information and the information system
a. Deployment of malware
b. Cracking Wireless encryption
c. Social engineering attacks
d. Port scanning
e. Data ransoming
3. Non-repudiation is implemented using asymmetrical cryptography in the form of creating a hash of the message and encrypting it with the sender’s private key as part of the solution.
True
False
4. Mean absolute deviation (MAD) is the preferred measure for determining if a bias exists in our model.
True
False
5. Which of the following is true?
A. The predictive power of an independent variable comes from the level of correlation that it has with the dependent variable.
B. If you have a variable with several categories like days of the week, there is no way that you can convert the categories to a quantitative variable.
C. All of the answers on this list are true. If the p-value for an independent variable is lower than 0.05, then we should discard that variable from the model.
D. Adjusted R squared is the amount of correlation between X and Y.