SBM4304 IS Security and Risk Management Assignment

Assignment Help Computer Networking
Reference no: EM132391145

Unit Code - SBM4304

Unit Name - IS Security and Risk Management

Name of Program - Bachelor of Business Information Systems

Asia Pacific International College, APIC, Australia

SECTION A - Multiple Choice Questions

Answer all multiple choice questions.

Q1. The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

a. network security

b. information security

c. physical security

d. logical security

Q2. In information security, an example of a threat agent can be ____.

a. a force of nature such as a tornado that could destroy computer equipment

b. a virus that attacks a computer network

c. an unsecured computer network

d. both a and b

Q3. _______is when an attacker tricks users into giving out information or performing

a compromising action.

a. Phreaking

b. Hacking

c. Social engineering

d. Reverse engineering

Q4. Which of the following malware can transfer via network without the need of the user action?

a. Virus

b. Worm

c. Adware

d. Spyware

Q5. Unlike other malware, a ____ is heavily dependent upon the user for its survival.

a. Trojan

b. worm

c. rootkit

d. virus

Q6. _________is a language used to view and manipulate data that is stored in a relational database.

a. C

b. DQL

c. SQL

d. ISL

Q7. HTML is a markup language that uses specific ____ embedded in brackets.

a. blocks

b. marks

c. taps

d. tags

Q8. Web application attacks are considered ____ attacks.

a. client-side

b. hybrid

c. server-side

d. relationship

Q9. ____ substitutes DNS addresses so that the computer is automatically redirected to another device.

a. DNS poisoning

b. Phishing

c. DNS marking

d. DNS overloading

Q10. _______is the probability that a risk will occur in a particular year.

a. SLE

b. ALE

c. ARO

d. EF

Q11. A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

a. application analyzer

b. protocol analyzer

c. threat profiler

d. system analyser

Q12. ________is a technology that can help to evenly distribute work across a network.

a. Stateful packet filtering

b. Load balancing

c. DNS caching

d. DNS poisoning

Q13. A(n) ____ encrypts all data that is transmitted between the remote device and the network.

a. IKE tunnel

b. VPN

c. endpoint

d. router

Q14. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.

a. subject

b. reference monitor

c. entity

d. label

Q15. A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.

a. accounting

b. user control

c. access control

d. authorization control

Q16. ____ accounts are user accounts that remain active after an employee has left an organization.

a. Active

b. Stale

c. Orphaned

d. Fragmented

Q17. The ____ function is a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.

a. Registration Authority

b. Certificate Authority

c. Repudiation Authority

d. Intermediate Authority

Q18. With the ____ model, there is one CA that acts as a "facilitator" to interconnect all other CAs.

a. bridge trust

b. distributed trust

c. third-party trust

d. transitive trust

Q19. The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.

a. AES

b. RSA

c. Twofish

d. Blowfish

Q20. ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.

a. Blocking

b. Hashing

c. Encrypting

d. Cloning

SECTION B - Short Answer Questions

Answer any five questions from a choice of nine.

Q1. Discuss information protection using CIA with examples.

Q2. Illustrate Gary hat hackers explaining their main goals.

Q3. Discuss the process of private key encryption with the support of diagram.

Q4. Discuss hashing explaining its main characteristics.

Q5. Differentiate between the three main types of malware: Viruses, worms and Trojans.

Q6. Layering is one of the techniques the IT team used to protect organization information. Illustrate the layering security principle.

Q7 Discuss the least of privilege control and its benefits for access control.

Q8. Explain the main weakness of symmetric cryptographic algorithms and how asymmetric cryptographic algorithms can be used overcome the weakness.

Q9. Discuss Phishing attack and illustrate three variations of phishing.

SECTION C - Application Question

Q1. Use the keyword "RISE" and apply a transposition cipher (show both encryption and decryption) on the following plain text - "YOU ARE STRONGER THAN WHAT YOU BELIEVE".

Reference no: EM132391145

Questions Cloud

Distinguishing the traits between the groups : History, values, and worldview, language and communication patterns, art and other expressive forms, norms and rules, lifestyle characteristics, relationship.
Explain overall how microorganism : 1. Explain overall how microorganism can be used to manufacture and to provide services.
Define metabolism : 1. Define Metabolism 2. Compare and contrast catabolic and anabolic reactions, how do they work together?
Calculating odds ratio using given information : Data can be qualitative or quantitative. Qualitative data is helpful to generate a hypothesis and gather information if little is known about an expected.
SBM4304 IS Security and Risk Management Assignment : SBM4304 IS Security and Risk Management Assignment Help and Solution. Asia Pacific International College, Australia - Discuss information protection using CIA
What are the advantages of performing a gram stain : What are the advantages of performing a gram stain versus a simple stain for visualizing bacteria?
Contribute to the pathogenicity of bacteria : List a few enzymes and toxins that contribute to the pathogenicity of bacteria. How do they work?
Use deadly force in the defense of their property : Contrary to common law, today, in most, if not all states, a person cannot use deadly force in the defense of their property.
Differences between research and research utilization : Describe and discuss the differences between research, research utilization, and evidence-based practice. Provide examples. The response must be typed.

Reviews

Write a Review

Computer Networking Questions & Answers

  Write a paper on it system integrity- cloud computing

Write a methodology paper on IT System Integrity - Cloud Computing. Instrumentation: Describe any instruments you anticipate using to collect data.

  Explain merits and demerits of open source systems in

consider yourself as the head of the it department of a marketing research organization. how will you align

  Create subnet assignment which give contiguous address space

Provide subnet assignment which gives contiguous address space to each department. (b) Do same in (a) but with department B having 70 hosts.

  A gourmet coffee shop in downtown sf is open 200 days a

a gourmet coffee shop in downtown sf is open 200 days a year and sells an average of 75 pounds of kona coffee beans a

  Discussion of the anticipated field research method

Network security involves protecting the networking infrastructure from cybercrime by use of physical or software preventive measures

  About the article that you believe influences

After reading the above web article URL link please provide 2-3 paragraphs content what it is about the article that you believe influences RFID systems today?

  What are the main components of cryptology

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext?- Define asymmetric encryption.

  To do this your network should be designed to leverage

you work as a consultant for a small consulting firm located in south florida. your company was recently contracted to

  Identify real-time forensics procedures and actual tool used

identify real-time forensics procedures and actual tool (e.g., Encase Enterprise) used for computer imaging, image verification and authentication over network.

  Set up a simple network using two pcs and a router

You are required to set up a network consisting of a PC, router and server. The router will have two ethernet network interfaces and be configured to route network traffic between them.

  Identify a freeware tool that can monitor the entire network

HS1011 Data Communication and Networks Assignment. Identify a freeware tool that can monitor the entire network and show status of each computer in the network

  Distinguish between packet switching and circuit switching

Distinguish between packet switching and circuit switching: Give three advantages and three disadvantages of each one and discuss four advantages of layering as seen in the TCP/IP architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd