Which of the following types of trust models is used by pki

Assignment Help Management Information Sys
Reference no: EM132186973

Answer the following Questions :

What term is directly related to customer privacy considerations?

a. Information classification

b. Data handling policies

c. Clean desk policies

d. Personally identifiable information

A distributed denial of service attack can best be described as:

a. Invalid characters being entered into a field in a database application

b. Multiple attackers attempting to gain elevated privileges on a target system

c. User attempting to input random or invalid data into fields within a web browser application

d. Multiple computers attacking a single target in an organized attempt to deplete its resources

Which of the following is an authentication service that uses UDP as a transport medium?

a. LDAP

b. TACACS+

c. RADIUS

d. Kerberos

Which of the following is a security risk regarding the use of public P2P as a method of collaboration?

a. Limiting the amount of necessary space for data storage

b. Monitoring data changes induces a higher cost

c. Data integrity is susceptible to being compromised

d. Users are not responsible for data usage tracking

The following are encryption types except:

a. File and folder

b. RADIUS

c. Full disk

d. SMIME

Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?

a. PKI

b. ACL

c. CA

d. CRL

What type of malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-up based on browsing habits?

a. Adware

b. Virus

c. Rootkit

d. Botnet

Which of the following types of trust models is used by PKI?

a. Transitive

b. Decentralized

c. Open source

d. Centralized

Of the following, what risk concept requires an organization to determine the number of failures per year?

a. MTBF

b. SLE

c. Quantitative analysis

d. ALE

Which of the following types of logs could provide clues that someone has been attempting to compromise the SQL server database?

a. SQL_LOG

b. Event

c. Security

d. Access

Without validation, a user's input and application becomes vulnerable to all of the following except:

a. Spear phishing

b. Buffer overflow

c. Command injection

d. SQL injection

Which of the following offerings typically allows the customer to apply operation system patches?

a. Cloud based storage

b. Infrastructure as a service

c. Software as a service

d. Public clouds

When you are verifying file integrity on a remote system that is bandwidth limited, which of the following tool combinations provides the strongest confidence?

a. MD5 and SHA-1

b. MD5 and 3DES

c. SHA-256 and RSA

d. SHA-256 and AES

What is a requirement when implementing PKI if data loss is unacceptable?

a. Certificate revocation list

b. Non-repudiation

c. Key escrow

d. Web of trust

Kerberos and LDAP are commonly used for which of the following?

a. To store usernames and passwords for Federated Identity

b. To sign SSL wildcard certificates for subdomains

c. To utilize single sign-on capabilities

d. To perform queries on a directory service

Which of the following is another name for a symmetric key used to exchange a shared secret to begin communication securely?

a. Private key

b. Public key

c. Session key

d. Digital signature

Mandatory vacation is a security control which can be used to uncover which of the following?

a. Fraud committed by a system administrator

b. Software vulnerabilities in vendor code

c. The need for additional security staff

d. Poor password security among users

You are walking into your building when you are asked by another employee to let you into the building because they lost their badge. What does this describe?

a. Whaling

b. Impersonation

c. Tailgating

d. Shoulder surfing

You have implemented an array of four servers to accomplish one specific task. This is best known as what?

a. RAID

b. Clustering

c. Virtualization

d. Load balancing

Fundamental information security principles include confidentiality, availability, and which of the following?

a. The ability to secure data against unauthorized disclosure to external sources

b. The capacity of a system to resist unauthorized changes to stored information

c. The characteristic of a system to provide uninterrupted service to authorized users

d. The confidence with which a system can attest to the identity of a user

As an administrator you wish to hide the network addresses of internal network when connecting to the internet. What is the most effective way to mask the network address the users would be passing the traffic through is?

a. NIPS

b. NAT

c. Stateful firewell

d. Packet-filtering firewall

As a security administrator, you want to replace your RADIUS authentication with a more secure protocol that can use EAP. Which is the best fit for your project?

a. Diameter

b. CHAP

c. Kerberos

d. SAML

What device monitors network traffic in a passive manner?

a. Firewall

b. IDS

c. Web browser

d. Sniffer

Of the following, which will provide the strongest encryption?

a. RSA with a 1024-bit key

b. AES with a 256-bit key

c. DES with a 56-bit key

d. Random one-time pad

Which of the following must a security administrator implement to isolate public facing servers from both the corporate network and the internet?

a. IPSec

b. NAC

c. NAT

d. DMZ

Reference no: EM132186973

Questions Cloud

Functions carried out in daily operations of organization : Describe at least three characteristics that help differentiate projects from other functions carried out in the daily operations of the organization.
Describe the transnational media business environment : Describe the transnational media business environment as characterized in the textbook. What assumptions and/or misconceptions exist in this industry?
Usefulness and limitations of the monetary policy : Briefly describe the usefulness and limitations of the monetary policy tools of the Federal Reserve System.
Expect to happen to the money supply : Explain what we would expect to happen to the money supply if the Federal Reserve buys $5.5 million worth of U.S. Government bonds
Which of the following types of trust models is used by pki : Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?
What are the advantages of customer based pricing : What are the advantages of customer based pricing. How would you manage demand in a pure service industry? What method would you use to predict the demand.
Pay for expedited handling : If you are willing to pay for expedited handling, you can be paid in one month. Would you be willing to pay $50? $100? $200? More?
The benefits of change management : Develop an argument to your manager on the importance of change management.
Describe the physical development of the child : Describe the physical development of the child. Explain if their development matched (or does not match) the statistics in your textbook?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd