Which of the following are properties of information

Assignment Help Management Information Sys
Reference no: EM131999890

Choose the best answer (one) and give reason in a few sentences for your choice or not choosing other. Please give a reference.

Q1. Businesses are motivated to use cryptography to protect information because

A. information is the most difficult asset to protect

B. information is the asset with the greatest organizational value

C. information is the easiest thing to protect

D. networks and systems are very difficult to protect adequately

Reason: -

Q2. Which of the following is an example of a comprehensive security strategy? ______

A. We already use encryption, so we are safe.

B. We can detect intrusions with our intrusion detection software and have a firewall. These are supplemented by our use of cryptography.

C. . We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place.

Reason: -

Q3. What is the basis of the modern cryptography? _________________

A. manipulation of data

B. mathematical principles

C. creating disguises for information

D. none of the above

Reason:

Q4 Buffer overflow can lead to___________

A. Lead to unauthorized access

B. Denial of Service

C. Trojan horses

D. -Password cracking

What are the consequences?

Q5. The Man in the Middle attack be thwarted by

A. By using email

B. Sending message in two parts

C. By encrypting the message

D. By making it boring

Reason and reference: -

Q6. Which of the following are properties of information?

A. It has evolved from data and is processed data.

B. It has identity.

C. It can be mathematically manipulated

D. A and B

E. A and C

F. A, B and C

No Reason required

Q7 The denial of service is considered as

A. Intrusion threat

B. Session hijacking threat

C. Network threat

D. Operating system threat

Reason: -

Q8  Which of the following choices is not part of a suggested information security plan?

A. protection of the information itself at the core

B. hardening of our resources (systems and networks)

C. authentication of those accessing the information

D. Sharing strong passwords

Reason: -

Q9 The best trust model for e commerce is _______

A. Public Key Certificates and Certificate Authorities

B. Kerberos

C. PGP Web of Trust

D. A, B, and C

E. None.

Reason and reference: -

Q10 Hardening of DES cannot be accomplished by encrypting twice by two different keys: True or False

Reason:

Q11  (APA format, Time New Roman 12 pts type double spaced, 200-250 words)

Compare CAIN and CIA. Could you suggest any improvement in then?

Reference no: EM131999890

Questions Cloud

Write a brief synthesis and summary of the two articles : Research at least two articles on the topic of the strategic importance of cloud computing in business organizations.
Recover the farm equipment or compel payment : When Day could not pay the loans back, Case filed suit to recover the farm equipment or compel payment.
Unlevered beta of mapco before restructuring : Unlevered beta of Mapco before restructuring? Unlevered beta of the remaining divisions?
Analyze the benefits afforded to health care marketers : Analyze the benefits afforded to health care marketers that understand the importance of establishing core values that guide health care organizations.
Which of the following are properties of information : Which of the following choices is not part of a suggested information security plan? Which of the following are properties of information ?
Describe your approach to care : Describe your approach to care. Describe a method for providing both the patient and family with education and explain your rationale.
Failures associated with asymmetry of information : Mention the two forms of market failures associated with asymmetry of information. In each case use a specific example to explain the circumstances
Why do you need to select a business performance problem : Why do you need to select a business performance problem that will require the acquisition of IT services from an external IT services contractor?
Showtime-history bundle available : Suppose Time Warner could sell Showtime for $9, and the History channel for $8, while making Showtime-History bundle available for $13.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Compare and contrast the selected frameworks

Select 3 frameworks, and discuss how they are used to represent an integration of system components. Compare and contrast the 3 selected frameworks.

  Do you think systems like safedsa will work in a real-world

Spectrum sharing is a common occurence whenever high powered, long distance radio communication is needed.

  Choose google technologies would you like to research on

Find and choose 5 Google technologies would you like to research on. Share one interesting finding about each technology that you have chosen

  Why didnt you bring this up in todays meeting

Imagine that you are an agile coach. Outline a plan that sets the expectations for your team when beginning a project. Provide a rationale for your response.Read the mini-case titled, "Agile Team Leadership". Suggest the key actions that you would..

  Review the hacking tools that are available

There are a wide variety of hacker tools. Perform a search on the World Wide Web and review the hacking tools that are available.

  Explain how to interpret the numbers in this model

Discuss how you might use business analytics in your personal life, such as managing your grocery purchasing, automobile maintenance.

  Describe the nature of the organization you have selected

Describe the nature of the organization you have selected, its mission, and the high-level purpose of their information system. Identify the owner of the information system. Describe how you would see the system processes from the viewpoint of the sy..

  Briefly define and describe the scenario

Briefly define and describe the scenario for which the database will be designed, the major problem(s) that the users in the given scenario.

  Research websites and other technologies that provide

research websites and other technologies that provide private information on u.s. citizens.please help me respond to

  Implement an enterprise resource planning system

Would implementing an enterprise resource planning system help streamline operations and achieve efficiencies between operating departments? What major concerns need to be addressed

  Analyze means in which data moves within the organization

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

  Who are developing qualifications necessary to succeed

With growing trends toward outsourcing, some economists are pointing to the emergence of "globalized professionals", who are developing qualifications necessary to succeed in the global job market.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd