Which of the following types of trust models is used by pki

Assignment Help Management Information Sys
Reference no: EM132186973

Answer the following Questions :

What term is directly related to customer privacy considerations?

a. Information classification

b. Data handling policies

c. Clean desk policies

d. Personally identifiable information

A distributed denial of service attack can best be described as:

a. Invalid characters being entered into a field in a database application

b. Multiple attackers attempting to gain elevated privileges on a target system

c. User attempting to input random or invalid data into fields within a web browser application

d. Multiple computers attacking a single target in an organized attempt to deplete its resources

Which of the following is an authentication service that uses UDP as a transport medium?

a. LDAP

b. TACACS+

c. RADIUS

d. Kerberos

Which of the following is a security risk regarding the use of public P2P as a method of collaboration?

a. Limiting the amount of necessary space for data storage

b. Monitoring data changes induces a higher cost

c. Data integrity is susceptible to being compromised

d. Users are not responsible for data usage tracking

The following are encryption types except:

a. File and folder

b. RADIUS

c. Full disk

d. SMIME

Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?

a. PKI

b. ACL

c. CA

d. CRL

What type of malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-up based on browsing habits?

a. Adware

b. Virus

c. Rootkit

d. Botnet

Which of the following types of trust models is used by PKI?

a. Transitive

b. Decentralized

c. Open source

d. Centralized

Of the following, what risk concept requires an organization to determine the number of failures per year?

a. MTBF

b. SLE

c. Quantitative analysis

d. ALE

Which of the following types of logs could provide clues that someone has been attempting to compromise the SQL server database?

a. SQL_LOG

b. Event

c. Security

d. Access

Without validation, a user's input and application becomes vulnerable to all of the following except:

a. Spear phishing

b. Buffer overflow

c. Command injection

d. SQL injection

Which of the following offerings typically allows the customer to apply operation system patches?

a. Cloud based storage

b. Infrastructure as a service

c. Software as a service

d. Public clouds

When you are verifying file integrity on a remote system that is bandwidth limited, which of the following tool combinations provides the strongest confidence?

a. MD5 and SHA-1

b. MD5 and 3DES

c. SHA-256 and RSA

d. SHA-256 and AES

What is a requirement when implementing PKI if data loss is unacceptable?

a. Certificate revocation list

b. Non-repudiation

c. Key escrow

d. Web of trust

Kerberos and LDAP are commonly used for which of the following?

a. To store usernames and passwords for Federated Identity

b. To sign SSL wildcard certificates for subdomains

c. To utilize single sign-on capabilities

d. To perform queries on a directory service

Which of the following is another name for a symmetric key used to exchange a shared secret to begin communication securely?

a. Private key

b. Public key

c. Session key

d. Digital signature

Mandatory vacation is a security control which can be used to uncover which of the following?

a. Fraud committed by a system administrator

b. Software vulnerabilities in vendor code

c. The need for additional security staff

d. Poor password security among users

You are walking into your building when you are asked by another employee to let you into the building because they lost their badge. What does this describe?

a. Whaling

b. Impersonation

c. Tailgating

d. Shoulder surfing

You have implemented an array of four servers to accomplish one specific task. This is best known as what?

a. RAID

b. Clustering

c. Virtualization

d. Load balancing

Fundamental information security principles include confidentiality, availability, and which of the following?

a. The ability to secure data against unauthorized disclosure to external sources

b. The capacity of a system to resist unauthorized changes to stored information

c. The characteristic of a system to provide uninterrupted service to authorized users

d. The confidence with which a system can attest to the identity of a user

As an administrator you wish to hide the network addresses of internal network when connecting to the internet. What is the most effective way to mask the network address the users would be passing the traffic through is?

a. NIPS

b. NAT

c. Stateful firewell

d. Packet-filtering firewall

As a security administrator, you want to replace your RADIUS authentication with a more secure protocol that can use EAP. Which is the best fit for your project?

a. Diameter

b. CHAP

c. Kerberos

d. SAML

What device monitors network traffic in a passive manner?

a. Firewall

b. IDS

c. Web browser

d. Sniffer

Of the following, which will provide the strongest encryption?

a. RSA with a 1024-bit key

b. AES with a 256-bit key

c. DES with a 56-bit key

d. Random one-time pad

Which of the following must a security administrator implement to isolate public facing servers from both the corporate network and the internet?

a. IPSec

b. NAC

c. NAT

d. DMZ

Reference no: EM132186973

Questions Cloud

Functions carried out in daily operations of organization : Describe at least three characteristics that help differentiate projects from other functions carried out in the daily operations of the organization.
Describe the transnational media business environment : Describe the transnational media business environment as characterized in the textbook. What assumptions and/or misconceptions exist in this industry?
Usefulness and limitations of the monetary policy : Briefly describe the usefulness and limitations of the monetary policy tools of the Federal Reserve System.
Expect to happen to the money supply : Explain what we would expect to happen to the money supply if the Federal Reserve buys $5.5 million worth of U.S. Government bonds
Which of the following types of trust models is used by pki : Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?
What are the advantages of customer based pricing : What are the advantages of customer based pricing. How would you manage demand in a pure service industry? What method would you use to predict the demand.
Pay for expedited handling : If you are willing to pay for expedited handling, you can be paid in one month. Would you be willing to pay $50? $100? $200? More?
The benefits of change management : Develop an argument to your manager on the importance of change management.
Describe the physical development of the child : Describe the physical development of the child. Explain if their development matched (or does not match) the statistics in your textbook?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research and evaluate three eims software application

Research and evaluate three EIMS software application packages for each of the three Core enterprise management functions: CRM, ERP, and SCM.

  Compare between the various types of information systems

Discuss how Porter's competitive forces model and the value chain model support the organizations in utilizing the information systems as competitive edge.

  Prepare a visual representation of the architecture

Identify the key elements of an appropriate e-commerce Web site for the organization.Prepare a visual representation of the architecture.

  Determine the fundamental obstacles

Analyze the main advantages and disadvantages of using data analytics within the industry or company that you have chosen.

  Provide a concise description of madonnas career strategy

You have noted that a firm's strategy can be described in terms of the answers to two questions: "Where are we competing?"

  Write down as many dns names or ip addresses as you can

Use the APA format for papers, etc. Use spell check, grammar check, etc., to make sure that your papers are submitted in professional form with no keyboarding.

  Prepare a brochure for a data repositorycreate a brochure

prepare a brochure for a data repositorycreate a brochure advertising your services as a data repository.research

  Describe the main business problems and goals

Describe the scope of your project by providing an overview of the selected organization: its size, its location, and your reasons for choosing it.

  Identify health care issue that interest you and explain why

List the strategies you would use to lead the team to success and identify potential obstacles that may be faced, along with plans to deal with them.

  Discuss the evolution of information systems

Discuss the evolution of information systems in an organization. How can the use of ERP systems remove information or functional silos in organizations?

  Create a document with a mockup of a proposed executive

Executive dashboards enable managers to view disparate data without having to open up and view multiple applications in different windows or on different screen

  Develop a document for a private-sector audience

Develop a document for a private-sector audience of chief executive officers. Pick any of the critical infrastructures identified in Homeland Security.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd