Looking for a similar answer, essay, or assessment help services?

Simply fill out the order form with your paper’s instructions in a few easy steps. This quick process ensures you’ll be matched with an expert writer who
Can meet your papers' specific grading rubric needs. Find the best write my essay assistance for your assignments- Affordable, plagiarism-free, and on time!

Posted: September 1st, 2023

You are the security administrator for a private corporation

INFA610 Name ___________________________________________Multiple Choice – 5 Points Each1. You are the security administrator for a private corporation. Your network hosts awide range of data from freely distributed Web documents to customer contact liststo financial records to proprietary business process documentation. All data on thecompany network is labeled as classified and confidential. However, users don’tseem to understand that they need to handle certain documents with more care andcontrol than others. Which of the following will improve this situation?a.b.c.d.Enforce a mandatory access control environment.Use stronger authentication factors.Create a classification policy.Define an acceptable use policy.Answer _______2. You are the security administrator for a company that is a government contractor.You have an established classification policy. Your current means of managingaccess seems to offer little in the manner of granular controls. Which of thefollowing control mechanisms is a suitable improvement for this environment?a.b.c.d.Least privilegeNeed to knowSeparation of dutiesJob rotationAnswer _________3. You are the security administrator for your organization. You are evaluating risksfor various assets stored on the network. One asset, a collection of Request forComments (RFC) documents that was downloaded from an Internet source, isthreatened by a new Trojan horse program that locates and deletes text documents.Your system is vulnerable to this Trojan horse since no other detection systems aredeployed on your network, other than a simple antivirus software product. Why canyou ignore this specific risk?a.b.c.d.All antivirus software utilities detect and block Trojan horses.A Trojan horse is effective only if it is executed by an administrative user.Risks exist only against physical assets.The impact of the risk is negligible.Answer ____________V6Page 1INFA610 Name ___________________________________________4. What specific policy might recommend removing a server from the network and reinstalling all software and data?a.b.c.d.A privacy policyAn authentication policyAn incident response policyA violations reporting policyAnswer __________5. You are the network administrator for your organization. You’ve been assigned todocument the network. You collect the relevant information and write out detailedreports for every hardware device, you create a network wiring diagram, and youeven write out complete configuration settings for all of the approved applications. Afew weeks later the company contracts with a consulting company to performpenetration testing against the network. They look at your network documentationand say that they cannot use it in their work. What is the possible reason for thisclaim?a.b.c.d.The documentation does not include any security details.The documentation is out of date.The documentation does not include operating systems.The documentation does not include disaster recovery plans.Answer ________6. You work for a company that sells products over the Internet. Every time a sale ismade, a database record of the transaction is transmitted from the demilitarizedzone (DMZ) to the database server in the private network where the databaseresides. You use a network-based IDS (NIDS) to monitor the network traffic fromthe DMZ to the private network. A Web server that supports your e-commercesolution is used in the DMZ. A denial of service (DoS) attack is detected by theNIDS. Which of the following is the least desirable response from the NIDS?a.b.c.d.Recording the incident in a report logDisabling the communication link between the DMZ and the private networkNotifying the network administrator of the issueBlocking packets with the same source IP address as the original DoS packetsAnswer __________V6Page 2INFA610 Name ___________________________________________7. You are the security administrator for a small company. You have a single serverthat is used as your Web server and e-commerce server. It is in your office, separateand distinct from all other systems. You have two Internet connections: onededicated for use by the Web server and the other for shared use by the officenetwork. You just completed a forensic investigation of an intrusion against the Webserver that caused significant damage to the hosted data files. The intruder gainedadministrative-level access and made numerous configuration and setting changesthroughout the system. You even found several sets of hacker tools hidden in variousplaces in the system. You need to get the Web server back online quickly since youare losing sales every hour the server remains offline. You format the hard drives,reinstall the operating system and applications, manually reconfigure the system,and then restore verified versions of your data files from backup tapes that werecreated before the intruder broke in. What additional activity is essential tocompleting the restoration process?a.b.c.d.Applying any new hot fixesPatching the exploited vulnerabilityPerforming a system-wide backupReapplying the company security templateAnswer ________8. What type of encryption does PKI use?a.b.c.d.SymmetricAsymmetricDESAESAnswer __________9. The upper layers of the OSI model are, in correct order.a.b.c.d.Session, application, presentationSession, presentation, applicationSession, application, presentation, physicalApplication, presentation, session, physicalAnswer _______10. Match the following:A. Application LayerB. Presentation LayerV6Page 31. Responsible for co-ordinating communication between systems2. Responsible for multiplexing upper-layer applicationsINFA610 Name ___________________________________________C. Session LayerD. Transport Layera.b.c.d.A--->3; B--->4; C--->2; D--->1A--->2; B--->4; C--->1; D--->4A--->2; B--->3; C--->4; D--->1A--->3; B--->4; C--->1; D--->2Answer _____________V6Page 43. Responsible for availability of intended communication partner4. Responsible for negotiating data transfer syntaxINFA610 Name ___________________________________________11. While reviewing the security logs for your server, you notice that a user on theInternet has attempted to access your internal mail server. Although it appears thatthe user's attempts were unsuccessful, you are still very concerned about thepossibility that your systems may be compromised. Which of the following solutionsare you most likely to implement?a.b.c.d.A firewall system at the connection point to the InternetA more secure password policyFile-level encryptionKerberos authenticationAnswer _________12. If Alice and Bob want to send encrypted messages to each other and Alicecommunicates first. In most cases what key will Alice use?a.b.c.d.e.Alice’s private keyAlice’s public keyBob’s private keyBob’s public keyNone of the aboveAnswer _______V6Page 5

Tags: Ace My Homework: Essay Help, Assignment Help: USA's #1 Online Assignment Writing Service, Do My Assignment for Me Online - Write Academic Papers, Reliable Online Homework Help For You

Order|Paper Discounts

Why Choose Essay Bishops?

You Want The Best Grades and That’s What We Deliver

Top Essay Writers

Our top essay writers are handpicked for their degree qualification, talent and freelance know-how. Each one brings deep expertise in their chosen subjects and a solid track record in academic writing.

Affordable Prices

We offer the lowest possible pricing for each research paper while still providing the best writers;no compromise on quality. Our costs are fair and reasonable to college students compared to other custom writing services.

100% Plagiarism-Free

You’ll never get a paper from us with plagiarism or that robotic AI feel. We carefully research, write, cite and check every final draft before sending it your way.