SBM4304 IS Security and Risk Management Assignment

Assignment Help Computer Networking
Reference no: EM132391145

Unit Code - SBM4304

Unit Name - IS Security and Risk Management

Name of Program - Bachelor of Business Information Systems

Asia Pacific International College, APIC, Australia

SECTION A - Multiple Choice Questions

Answer all multiple choice questions.

Q1. The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

a. network security

b. information security

c. physical security

d. logical security

Q2. In information security, an example of a threat agent can be ____.

a. a force of nature such as a tornado that could destroy computer equipment

b. a virus that attacks a computer network

c. an unsecured computer network

d. both a and b

Q3. _______is when an attacker tricks users into giving out information or performing

a compromising action.

a. Phreaking

b. Hacking

c. Social engineering

d. Reverse engineering

Q4. Which of the following malware can transfer via network without the need of the user action?

a. Virus

b. Worm

c. Adware

d. Spyware

Q5. Unlike other malware, a ____ is heavily dependent upon the user for its survival.

a. Trojan

b. worm

c. rootkit

d. virus

Q6. _________is a language used to view and manipulate data that is stored in a relational database.

a. C

b. DQL

c. SQL

d. ISL

Q7. HTML is a markup language that uses specific ____ embedded in brackets.

a. blocks

b. marks

c. taps

d. tags

Q8. Web application attacks are considered ____ attacks.

a. client-side

b. hybrid

c. server-side

d. relationship

Q9. ____ substitutes DNS addresses so that the computer is automatically redirected to another device.

a. DNS poisoning

b. Phishing

c. DNS marking

d. DNS overloading

Q10. _______is the probability that a risk will occur in a particular year.

a. SLE

b. ALE

c. ARO

d. EF

Q11. A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

a. application analyzer

b. protocol analyzer

c. threat profiler

d. system analyser

Q12. ________is a technology that can help to evenly distribute work across a network.

a. Stateful packet filtering

b. Load balancing

c. DNS caching

d. DNS poisoning

Q13. A(n) ____ encrypts all data that is transmitted between the remote device and the network.

a. IKE tunnel

b. VPN

c. endpoint

d. router

Q14. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.

a. subject

b. reference monitor

c. entity

d. label

Q15. A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.

a. accounting

b. user control

c. access control

d. authorization control

Q16. ____ accounts are user accounts that remain active after an employee has left an organization.

a. Active

b. Stale

c. Orphaned

d. Fragmented

Q17. The ____ function is a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.

a. Registration Authority

b. Certificate Authority

c. Repudiation Authority

d. Intermediate Authority

Q18. With the ____ model, there is one CA that acts as a "facilitator" to interconnect all other CAs.

a. bridge trust

b. distributed trust

c. third-party trust

d. transitive trust

Q19. The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

a. AES

b. RSA

c. Twofish

d. Blowfish

Q20. ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.

a. Blocking

b. Hashing

c. Encrypting

d. Cloning

SECTION B - Short Answer Questions

Answer any five questions from a choice of nine.

Q1. Discuss information protection using CIA with examples.

Q2. Illustrate Gary hat hackers explaining their main goals.

Q3. Discuss the process of private key encryption with the support of diagram.

Q4. Discuss hashing explaining its main characteristics.

Q5. Differentiate between the three main types of malware: Viruses, worms and Trojans.

Q6. Layering is one of the techniques the IT team used to protect organization information. Illustrate the layering security principle.

Q7 Discuss the least of privilege control and its benefits for access control.

Q8. Explain the main weakness of symmetric cryptographic algorithms and how asymmetric cryptographic algorithms can be used overcome the weakness.

Q9. Discuss Phishing attack and illustrate three variations of phishing.

SECTION C - Application Question

Q1. Use the keyword "RISE" and apply a transposition cipher (show both encryption and decryption) on the following plain text - "YOU ARE STRONGER THAN WHAT YOU BELIEVE".

Reference no: EM132391145

Questions Cloud

Distinguishing the traits between the groups : History, values, and worldview, language and communication patterns, art and other expressive forms, norms and rules, lifestyle characteristics, relationship.
Explain overall how microorganism : 1. Explain overall how microorganism can be used to manufacture and to provide services.
Define metabolism : 1. Define Metabolism 2. Compare and contrast catabolic and anabolic reactions, how do they work together?
Calculating odds ratio using given information : Data can be qualitative or quantitative. Qualitative data is helpful to generate a hypothesis and gather information if little is known about an expected.
SBM4304 IS Security and Risk Management Assignment : SBM4304 IS Security and Risk Management Assignment Help and Solution. Asia Pacific International College, Australia - Discuss information protection using CIA
What are the advantages of performing a gram stain : What are the advantages of performing a gram stain versus a simple stain for visualizing bacteria?
Contribute to the pathogenicity of bacteria : List a few enzymes and toxins that contribute to the pathogenicity of bacteria. How do they work?
Use deadly force in the defense of their property : Contrary to common law, today, in most, if not all states, a person cannot use deadly force in the defense of their property.
Differences between research and research utilization : Describe and discuss the differences between research, research utilization, and evidence-based practice. Provide examples. The response must be typed.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd