Proprietary business process documentation

Assignment Help PL-SQL Programming
Reference no: EM131049751

1. You are the security administrator for a private corporation. Your network hosts a wide range of data from freely distributed Web documents to customer contact lists to financial records to proprietary business process documentation. All data on the company network is labeled as classified and confidential. However, users don't seem to understand that they need to handle certain documents with more care and control than others. Which of the following will improve this situation?

a.

Enforce a mandatory access control environment.

b.

Use stronger authentication factors.

c.

Create a classification policy.

d.

Define an acceptable use policy.

Answer _______

2. You are the security administrator for a company that is a government contractor. You have an established classification policy. Your current means of managing access seems to offer little in the manner of granular controls. Which of the following control mechanisms is a suitable improvement for this environment?

a.

Least privilege

b.

Need to know

c.

Separation of duties

d.

Job rotation

Answer _________

3. You are the security administrator for your organization. You are evaluating risks for various assets stored on the network. One asset, a collection of Request for Comments (RFC) documents that was downloaded from an Internet source, is threatened by a new Trojan horse program that locates and deletes text documents. Your system is vulnerable to this Trojan horse since no other detection systems are deployed on your network, other than a simple antivirus software product. Why can you ignore this specific risk?

a.

All antivirus software utilities detect and block Trojan horses.

b.

A Trojan horse is effective only if it is executed by an administrative user.

c.

Risks exist only against physical assets.

d.

The impact of the risk is negligible.

Answer ____________

4. What specific policy might recommend removing a server from the network and re-installing all software and data?

a.

A privacy policy

b.

An authentication policy

c.

An incident response policy

d.

A violations reporting policy

Answer __________

5. You are the network administrator for your organization. You've been assigned to document the network. You collect the relevant information and write out detailed reports for every hardware device, you create a network wiring diagram, and you even write out complete configuration settings for all of the approved applications. A few weeks later the company contracts with a consulting company to perform penetration testing against the network. They look at your network documentation and say that they cannot use it in their work. What is the possible reason for this claim?

a.

The documentation does not include any security details.

b.

The documentation is out of date.

c.

The documentation does not include operating systems.

d.

The documentation does not include disaster recovery plans.

Answer ________

6. You work for a company that sells products over the Internet. Every time a sale is made, a database record of the transaction is transmitted from the demilitarized zone (DMZ) to the database server in the private network where the database resides. You use a network-based IDS (NIDS) to monitor the network traffic from the DMZ to the private network. A Web server that supports your e-commerce solution is used in the DMZ. A denial of service (DoS) attack is detected by the NIDS. Which of the following is the least desirable response from the NIDS?

a.

Recording the incident in a report log

b.

Disabling the communication link between the DMZ and the private network

c.

Notifying the network administrator of the issue

d.

Blocking packets with the same source IP address as the original DoS packets

Answer __________

7. You are the security administrator for a small company. You have a single server that is used as your Web server and e-commerce server. It is in your office, separate and distinct from all other systems. You have two Internet connections: one dedicated for use by the Web server and the other for shared use by the office network. You just completed a forensic investigation of an intrusion against the Web server that caused significant damage to the hosted data files. The intruder gained administrative-level access and made numerous configuration and setting changes throughout the system. You even found several sets of hacker tools hidden in various places in the system. You need to get the Web server back online quickly since you are losing sales every hour the server remains offline. You format the hard drives, reinstall the operating system and applications, manually reconfigure the system, and then restore verified versions of your data files from backup tapes that were created before the intruder broke in. What additional activity is essential to completing the restoration process?

a.

Applying any new hot fixes

b.

Patching the exploited vulnerability

c.

Performing a system-wide backup

d.

Reapplying the company security template

Answer ________

8. What type of encryption does PKI use?

a. Symmetric

b. Asymmetric

c. DES

d. AES

Answer __________

9. The upper layers of the OSI model are, in correct order.

a. Session, application, presentation

b. Session, presentation, application

c. Session, application, presentation, physical

d. Application, presentation, session, physical

Answer _______

10.  Match the following: 

A. Application Layer            1. Responsible for co-ordinating communication between systems
B. Presentation Layer           2. Responsible for multiplexing upper-layer applications
C. Session Layer                   3. Responsible for availability of intended communication partner 
D. Transport Layer               4. Responsible for negotiating data transfer syntax

a. A--->3; B--->4; C--->2; D--->1

b. A--->2; B--->4; C--->1; D--->4

c. A--->2; B--->3; C--->4; D--->1

d. A--->3; B--->4; C--->1; D--->2

Answer _____________

11.  While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?

a. A firewall system at the connection point to the Internet

b. A more secure password policy

c. File-level encryption

d. Kerberos authentication

Answer _________

12.  If Alice and Bob want to send encrypted messages to each other and Alice communicates first.  In most cases what key will Alice use?

a. Alice's private key

b. Alice's public key

c. Bob's private key

d. Bob's public key

e. None of the above

Reference no: EM131049751

Questions Cloud

Expected and required rates of return-risk-free rate : Expected and required rates of return Assume that the risk-free rate is 4% and the market risk premium is 8%. What is the expected return for the overall stock market? Round your answer to two decimal places. What is the required rate of return on a ..
Prepare a comprehensive financial analysis and proposal : Throughout this course you will prepare a comprehensive financial analysis and proposal (excluding tables, figures, and addenda) that will demonstrate your understanding of key financial concepts, strategies and practices.
Security administrator for a small company : You are the security administrator for a small company. You have a single server that is used as your Web server and e-commerce server. It is in your office, separate and distinct from all other systems.
Write about arlington county public schools lunch schedules : Write about Arlington county public schools lunch and breakfast schedules or Virginia state as a whole. Develop a coherently structured paper with an introduction, body, and conclusion.
Proprietary business process documentation : You are the security administrator for a private corporation. Your network hosts a wide range of data from freely distributed Web documents to customer contact lists to financial records to proprietary business process documentation.
Prepare a draft income statement of kalama ltd : AC491 Financial Accounting, Reporting and Disclosure. Prepare a draft income statement of Kalama Ltd for the directors of the company for the year ended 31 December 2013 and the statement of financial position (balance sheet) at that date
Automated manufacturers uses high-tech equipment : Automated Manufacturers uses high-tech equipment to produce specialized aluminum products for its customers. Each one of these machines costs $1,480,000 to purchase plus an additional $52,000 a year to operate.
Make plots of the two triangular waves : For the purposes of the plot you may as well take the speed c, the height of the triangle at time 0, and the half width of the base all equal to 1. Make your plots for lots of times ranging from t = -4 to 4.
Invested in each to maximize annual interest : A pension fund manager decides to invest a total of at most $45 million in U.S. Treasury bonds paying 5% annual interest and in mutual funds paying 7% annual interest. He plans to invest at least ?$5 million in bonds and at least ?$10 million in mutu..

Reviews

Write a Review

PL-SQL Programming Questions & Answers

  Create a database model

Create a database model and Submit the table creation statements for the Database Model.

  Write pl-sql procedures and functions

Write PL/SQL procedures and functions to populate and query that database

  Sql questions

Write a query to display using the employees table the EMPLOYEE_ID, FIRST_NAME, LAST_NAME and HIRE_DATE of every employee who was hired after to 1 January, 1995.

  Run the lab_03_01.sql script

Run the lab_03_01.sql script in the attached file to create the SAL_HISTORY table. Display the structure of the SAL_HISTORY table.

  Write sql queries

Write a query to display the last name, department number, and salary of any employee whose department number and salary both match the department number and salary of any employee who earns a commission.

  Explaining sql insert statement to insert new row in cds

Write down a SQL insert statement to insert new row in "CDS" table.

  Write down name of actors in ascending order

Write down actors (or actress, your choice, but not both) who have won at least two (2) Academy Awards for best actor/actress. Provide the actor name, movie title & year. Order the result by actor name."

  What is an sql injection attack

What is an SQL injection attack? Explain how it works, and what precautions must be taken to prevent SQL injection attacks.What are two advantages of encrypting data stored in the database?

  Determine resonant frequency in series rlc resonant circuit

Given the series RLC resonant circuit in the figure, operating at variable frequency, determine: The resonant frequency ω o ,  The circuit’s quality factor Q , The cut-off frequencies, f 1  & f 2  and the bandwidth BW

  Query that uses cube operator to return lineitemsum

Write summary query which uses CUBE operator to return LineItemSum (which is the sum of InvoiceLineItemAmount) group by Account(an alias for AccountDesciption).

  Query to show customers were missing for existing orders

As DBA, your manager called a meeting and asked why there are so many orders for customers that don't exist in the customer table. Write query which would shows which customers were missing for existing orders. Use a join or a subquery.

  Sql query into a relational algebra statement

Turn this SQL query into a relational algebra statement? SELECT Request.reqfor, Ordering.invamt, Ordering.invnbr, Ordering.invdat

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd