Describes how malicious code can get on your company

Assignment Help Computer Network Security
Reference no: EM13947433

I have answered the questions; however, I am uncertain if I am on the right track. Can you please let me know with some explanation if your answers are different?

1. Which best describes how malicious code can get on your computer?

a. Email attachments

b. Downloaded software from non-authoritative sources and websites

c. Sharing diskettes from computers without up to date antivirus software

d. All of the above

e. A and C only

My guess is "all of the above".

2. A way of verifying a message's integrity after transport across a network is through the use of:

a. A Message Authentication Code

b. Steganography

c. An encryption key

d. A cipher

My Guess is an encryption key as this appears to be the safest way to transmit a message.

3. Which of the following best describes examples of mobile code?

a. Java, Javascript, and ActiveX

b. HTML, the language of web pages

c. Postscript, the language of some LaserJet printers

d. All of the above

e. None of the above

My guess is (A) as HTML is for web pages and (C) I have no idea what it is used for.

4. Which statement best describes the advantages of public key encryption?

a. Keys are exchanged publicly without an eavesdropper being able to decrypt messages

b. Knowledge of one's public key does not yield knowledge of their private key

c. Encryption performance is faster than secret-key encryption

d. A and B only

e. None of the above

My guess is (A) is this correct..for some reason it doesn't look right.

5. Which statement best captures the advantage of secret key encryption?

a. It allows for faster encryption speeds than public key encryption

b. It only requires one key to be distributed for encryption and decryption

c. The keys are stronger than public keys and are more difficult to break

d. All of the above

e. A and B only.

My guess is (a).

6. Which of the following best describes what is removed from a hard drive when a file is deleted from the hard drive?

a. The MBR record, the FAT record, and the Directory Table entry.

b. The FAT record, the Directory Table entry, and the data clusters that the file occupied.

c. The FAT record and the Directory Table entry.

d. The FAT record, the Directory Table Entry, and the Partition Table.

My guess is (b).

Reference no: EM13947433

Questions Cloud

Determine which will be the independent variable : Choose 1 independent and 1 dependent variable from the following: variables - education level, smoking status, exercise, gender, marital status, age, weight, serum cholesterol, systolic blood pressure, sodium intake, IQ. WRITE A 100 - 200 word sta..
Certain about the direction of price change : You are positive that the XYZ stock price will change a lot in the near future. But you are not certain about the direction of price change. Which strategy is the best to use in this scenario?
Forward hedge or a money market hedge : Alpha Company, U.S.-based manufacturer of industrial equipment, just purchased a Korean company that produces plastic nuts and bolts for heavy equipment. Alpha's weighted average cost of capital is 10%. Given this information, determine whether a for..
New issue of preferred stock it calls : E-Eyes.com has a new issue of preferred stock it calls 20/20 preferred. The stock will pay a $20 dividend per year, but the first dividend will not be paid until 20 years from today. If you require a 9.25 percent return on this stock, how much should..
Describes how malicious code can get on your company : Which statement best describes the advantages of public key encryption?
Evidence plays a critical role in auditing : Evidence plays a critical role in auditing. Without quality evidence, auditors cannot arrive at the right conclusions about audit objectives. Evidence can be considered strong if it is persuasive. Persuasiveness, in turn, can be achieved if the ev..
What growth rate is expected for the company stock price : The stock price of Jenkins Co. is $53.90. Investors require a 13 percent rate of return on similar stocks. If the company plans to pay a dividend of $3.60 next year, what growth rate is expected for the company’s stock price?
Uniform heat generation within the shells : If there is uniform heat generation within the shells, obtain expressions for the steady-state, one-dimensional radial distributions of the temperature, heat flux, and heat rate. Contrast your results with those summarized in Appendix C.
Create a probability distribution for the number of bedrooms : Use the normal distribution to estimate the number of homes 18 or more miles but less than 22 miles from the center of the city. Compare this to the actual results. Does the normal distribution yield a good approximation of the actual results?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a program for recursive algorithm

Consider the following recursive algorithm

  Description and understanding of a newict service

Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis and provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.

  Identify the key features of the affordable care act

Identify the key features of the Affordable Care Act

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  Discuss specific malware and social engineer attacks

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Perform an attack against the cipher based

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

  Describe the objectives and main elements of a cirt plan

Describe the objectives and main elements of a CIRT plan and analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.

  Most of the organizations have now adopted or begun to

many organizations have now adopted or begun to offer cloud computing. this type of computing has advantages and

  Write a precis of construction engineering v hexyl pvt ltd

Write a precis of Construction Engineering (Aust) Pty Limited v Hexyl Pty Limited [1985] HCA 13; (1985) 155 CLR 541 and discuss how this case contributed to the law of partnership.

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  Describe identification and authentication and authorization

Assume you are a manager in a large international organization. You have been asked to assess the company's information systems and security controls. Describe identification, authentication, and authorization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd