Question

                Virus: Exploits that, like the mythical Trojan Horse, try to sneak into a firm’s network...

    1.                
  1. Virus:
    1. Exploits that, like the mythical Trojan Horse, try to sneak into a firm’s network by masquerading as something they are not.
    2. Programs that take advantage of security vulnerability to automatically spread, and do not require an executable to do so.
    3. Malware that encrypts a user’s files with demands that a user pays to regain control of their data and/or device.
    4. Programs that infect other software or files. They require an executable (a running program) to spread, attaching to other executables.                                                                                
  2. Turing Test:
    1. Technology that measures and analyzes human body characteristics for identification or authentication.
    2. Used to distinguish if a task is being performed by a computer or a human – e.g., CAPTCHAs.
    3. When an identity is proven by presenting more than one item for proof of credentials.
    4. An automated test to confirm the validity of an end user’s access credentials.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     
  3. Which of the following is false?
    1. A whitelist is a highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
    2. A blacklist is a program that denies entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.
    3. A firewall is a highly tempting, but bogus target meant to draw hacking attempts.
    4. An intrusion detection system monitors network use for potential hacking attempts.                      
  4. Which of the following is true?
    1. Information security is not simply a technical fix.
    2. The use of frameworks and adherence to them is the same as security.
    3. Ensuring appropriate levels of security does not entail either economic or intangible trade-offs.
    4. Firewalls are systems that act as controls for network traffic without any consideration for the specific nature of the traffic itself.

Chapter 7

  1. Which of the following is not one of the three pillars of Amazon’s business (as architected by Jeff Bezos)?
    1. Large selection.
    2. Customer experience.
    3. Lower prices.
    4. Attention to industry rivals.        

Homework Answers

Answer #1

Answer 1:

d. Programs that infect other software or files. They require an executable (a running program) to spread, attaching to other executables.          

Answer 2:

b. Used to distinguish if a task is being performed by a computer or a human – e.g., CAPTCHAs.

Answer 3:

c. A firewall is a highly tempting, but bogus target meant to draw hacking attempts.

Answer 4:

a. Information security is not simply a technical fix.

Answer 5:

d. Attention to industry rivals.

Please give thumbsup, or do comment in case of any query. Thanks.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions