Warning: Trying to access array offset on value of type bool in /home/topgsnkq/myessaydesk.com/wp-content/themes/enfold/framework/php/function-set-avia-frontend.php on line 637

IT Security questions

Choose the best answer (one) and give reason in a few sentences for your choice or not choosing other. Please give a reference. To get the full credit, the reason should be in your own words, not a copy from a reference/internet source. Such a copy will be considered plagiarizing. Remember I have the same access. I may not catch every time but if I catch you may get 0 for the entire assignment. Without a reason, and/or reference as noted you will not get the full credit. Remember have your name on each pageQ1. (4 pts) Businesses are motivated to use cryptography to protect information becauseA. information is the most difficult asset to protectB. information is the asset with the greatest organizational valueC. information is the easiest thing to protectD. networks and systems are very difficult to protect adequatelyReason: -Q2. (4 pts) Which of the following is an example of a comprehensive security strategy? ______A. We already use encryption, so we are safe.B. We can detect intrusions with our intrusion detection software and have a firewall. These are supplemented by our use of cryptography.C. . We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place.Reason: -Q3. (4 pts) What is the basis of the modern cryptography? _________________A. manipulation of dataB. mathematical principlesC. creating disguises for informationD. none of the aboveReason:Q4 (4 pts) Buffer overflow can lead to___________A. Lead to unauthorized accessB. Denial of ServiceC. Trojan horsesD. -Password crackingWhat are the consequences?Q5. (4 pts) The Man in the Middle attack be thwarted byA. By using emailB. Sending message in two partsC. By encrypting the messageD.  By making it boringReason and reference: -Q6. (4 pts) Which of the following are properties of information?A. It has evolved from data and is processed data.B. It has identity.C. It can be mathematically manipulatedD. A and BE. A and CF. A, B and CNo Reason requiredQ7 (4 pts) The denial of service is considered asA. Intrusion threatB. Session hijacking threatC. Network threatD. Operating system threatReason: -Q8 (4 pts) Which of the following choices is not part of a suggested information security plan?A. protection of the information itself at the coreB. hardening of our resources (systems and networks)C. authentication of those accessing the informationD. Sharing strong passwordsReason: -Q9 (4 pts) The best trust model for e commerce is _______A. Public Key Certificates and Certificate AuthoritiesB. KerberosC. PGP Web of TrustD. A, B, and CE. None.Reason and reference: -Q10(4 pts) Hardening of DES cannot be accomplished by encrypting twice by two different keys: True or FalseReason:Q11 (10 pts) (APA format, Time New Roman 12 pts type double spaced, 200-250 words)Compare CAIN and CIA. Could you suggest any improvement in then?

 
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"

"Do you have an upcoming essay or assignment due?


Get any topic done in as little as 6 hours

If yes Order Similar Paper

All of our assignments are originally produced, unique, and free of plagiarism.