Explain microsoft encrypting file system

Assignment Help Database Management System
Reference no: EM13924008

Part 2:

1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below):

A. Network 1. Coordinates communication between applications.

B. Physical 2. Supports useful functions over the transport layer such identity/location of applications.

C. Application 3. Moves information between hosts that are not directly connected.

D. Transport 4. Moves bits between the nodes in the network.

a. A--->3; B--->4; C--->2; D--->1

b. A--->2; B--->4; C--->1; D--->4

c. A--->2; B--->3; C--->4; D--->1

d. A--->3; B--->4; C--->1; D--->2

Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:

a. A patent

b. A copyright

c. A trademark

d. Ethical standards

Answer: _____

3. Security threats include which of the following:

a. Unlocked doors

b. Disgruntled employees

c. Hurricanes

d. Un-patched software programs

e. All of the above

Answer: _____

4. Denial of service attacks include (select one or more):

a. Buffer overflow attack

b. Smurf attack

c. Ping flood attack

d. SYN flood attack

e. All of the above

Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server.

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016. This is an example of which of the following attacks?

a. Virus

b. Logic Bomb

c. Spoofing

d. Trojan horse

e. Botnet

f. Rootkit

g. Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm.

Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process.

Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret.

They would like to protect this formula for as long as possible.

What type of intellectual property protection best suits their needs?

a. Copyright

b. Trademark

c. Patent

d. Trade Secret

Answer: _______

7. You should clear cookies in your browser periodically because:

a. They (Cookies) can be used to track your web browsing behavior and invade your privacy.

b. They can facilitate impersonation attacks.

c. They can be used to spread viruses.

d. a. & b.

e. b. & c.

f. a., b. & c.

Answer: _________

8. A TCP/IP session hijacking can be best described as:

a. Providing false identity information to gain unauthorized access

b. Establishing a connection without specifying a username or password

c. An attacker takes control of a session between the server and a client

d. Flooding the connection with too many requests

Answer: _________

9. Tracker attacks in databases get around:

a. Anonymization

b. Data transformation

c. Query size restriction

d. Data partitioning

Answer: _________

10. A race condition attack can result in:

a. A symbolic link

b. Object orientation

c. A deadlock

d. Access to low address memory locations

Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for

individual record resource.

a. Data perturbation

b. Database access control

c. Inference channeling

d. Output perturbation

Answer: _________

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only

query the statistical properties of each group as a whole.

a. compromise

b. inference

c. partitioning

d. query restriction

Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an

economical and convenient manner through the use of which of the following?

a. IPSec

b. HTTP over SSL

c. Link encryption

d. Microsoft Encrypting File System (EFS)

Answer: ______

14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers.

Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised.

Which of the following solutions are you most likely to implement?

a. A firewall system at the connection point to the Internet

b. An improved RBAC-based access control system for the application servers

c. File-level encryption

d. Kerberos authentication

Answer: _______

15. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?

a. A privacy policy

b. An authentication policy

c. An incident response policy

d. Wireless network access policy

Answer: ________

16. The security risk of allowing dynamic content ( to execute) on a target machine is:

a. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.

b. Malware may be included in the downloaded code and infect the target machine.

c. The mobile code author may never be known.

d. None of the above.

Answer: _______

17. Encrypting a message with a private key (of the sender) in an asymmetric system provides:

a. Proof of receipt

b. Confidentiality

c. Proof of origin

d. Message availability

Answer:_______

18. The correct ordering of the upper layers of the OSI model are:

a. Session, application, presentation

b. Session, presentation, application

c. Session, application, presentation, physical

d. Application, presentation, session, network

Answer: _______

19. In relational database parlance, the basic building block is a __________, which is a flat table.

a. attribute

b. tuple

c. primary key

d. relation

e. field

Answer: _____

20. Routers operate at the _____________ of the OSI stack?

a. Transport

b. Application

c. Session

d. Network

e. Data Link

Answer: _____

21. Gateways operate at the _____________ of the OSI stack?

a. Transport

b. Application

c. Session

d. Network

e. Data Link

Answer: _____

22. Which e-mail security protocol(s) depend(s) upon a "Web of Trust"?

a. Kerberos

b. Public Key Infrastructure (PKI)

c. Secure Sockets Layer (SSL)

d. Transport Layer Security (TLS)

e. Pretty Good Privacy (PGP)

f. Secure Multipurpose Internet Mail Extensions (S/MIME)

g. Privacy Enhanced Mail (PEM)

h. Data Link

Answer: _____

Reference no: EM13924008

Questions Cloud

About the beta of stock : A stock has an expected return of 13.2 percent, the risk-free rate is 8.5 percent, and the market risk premium is 10 percent. What must the beta of this stock be?
What price would you bid if you must win the project : What price would you bid if you want to maximize the expected value of the contribution from this contract? Defend your answers with discussion, making any assumptions you feel are reasonable and/or are supported by the information provided.
How are national exchanges around the world linked : What are Electronic Communication Networks (ECNs) and alternative trading systems (ATSs)? How are national exchanges around the world linked, and what is meant by "passing the book"?
Probabilities and conditional probabilities : Prepare a report (see below) with your ranking of the judges based on the probabilities and conditional probabilities, as well as the analysis of each court. Include the following seven (7) items in table format to support your ranking. Be sure to..
Explain microsoft encrypting file system : Encrypting a message with a private key (of the sender) in an asymmetric system provides:
Total revenue for the break-even volume : What is the total revenue for the break-even volume when the publishers take a total of $40,000 in salary?
Compute the NCF-COC and NPV : We invest $10 million in a furniture factory. The information we have is as follows. The European Union subsidizes the investment up to 60% of the cost and 40% of the interest. After the first ten year period, the NCF and the expenses will grow forev..
Develop a form based front end for a class management : In this assignment, students will develop a form based front end for a class management system and a database using a combination of JDBC commands, SQL, and Swing GUI components to allow users to query, insert, update and delete records using a si..
Describe the concept of purchasing power : The inflation rates in the British pound and the Australian dollar are 2% and 8% respectively. What should the expected spot rate /Forward ER be, if the Spot ER is BP/ A$ .1? Describe the concept of purchasing power.

Reviews

Write a Review

Database Management System Questions & Answers

  Produce a data gathering technique to ascertain user needs

Produce a data gathering technique to ascertain user needs for the Thomson Cycles new system. Examples of data gathering techniques: interview, questionnaire, survey, observation or JAD.

  Calculate individual consultants pay based on the tasks

Principles of database design, as demonstrated by the database design for project -  Designing and creating the following basic (master) tables for the application and "Employee" table, to hold the details of employees

  Determine what system privileges the dvonline role has

Determine what system privileges the DVONLINE role has. Determine what system privileges your account has been granted

  What is the note about loretta swits character in mash

What is the note about Loretta Swit's character in MASH and Who were the two leading men who played the leading role in Bewitched

  What are the different types of indexing supported by mysql

What are the different types of indexing supported by MySQL? What would you suggest as solutions, other than indexing, to speed up database access

  Create a query based on the agency table

Create a query based on the Agency table that includes the Agency, FirstName, LastName, and City fields, in that order. Save the query as AgenciesByCity, and then run it

  Design and implement the database-best home real estate

you are to design and implement the database of Best Home real estate that you have modelled in assignment-1 and a series of SQL queries to reflect the business logic of it

  Finding the most expensive product item in the shopping cart

Your program needs to be able to find the cheapest product item in the shopping cart. For it you may adopt the same strategy described in Subtask 2.2.

  Why the present system is inadequate

Imagine that you are the Chief Information Officer (CIO) of a large organization in the entertainment industry. Your organization has been suffering an alarming decline in ticket sales profits for the past several years. Why the present system is ..

  Determine the manufacturing overhead cost

Determine the manufacturing overhead cost per unit of each of the companys two products under the traditional costing system.

  Develop proposal recommends hardware and operating system

Papers should be created with Microsoft Word in the APA style and have a title page, short abstract, body, and conclusion. The "body" should contain between 1000 and 2000 words and include a Works Cited page, headers and other appropriate APA ele..

  Ithis hands-on assignment you will be expected to learn

in this hands-on assignment you will be expected to learn a. how to interactively query a database by using sql

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd