Information Technology  >  EXAM  >  SEC280 Information Systems Security-Final Exam (SOLVED) (All)

SEC280 Information Systems Security-Final Exam (SOLVED)

Document Content and Description Below

SEC280-FinalExamSEC280 Information Systems Security-Final Exam (SOLVED) 1. (TCO 5) Unsolicited commercial e-mail is known as _____. (Points : 4) hoax e-mail worm spam spork Question 2.2. (TCO 5) ... Two tools that can be used to encrypt e-mail are _____. (Points : 4) MIME/S and PGP PGP and S/MIME PSP and MIME/S PGP and SIME Question 3.3. (TCO 5) One of the largest security problems with IM programs is _____. (Points : 4) their inability to share files the lack of support for encryption the lack of support for video the lack of support for hiding online presence Question 4.4. (TCO 6) What is the name of the process that controls access to information based on the sensitivity of that information and whether or not the user is operating at the appropriate sensitivity level and has the authority to access that information? (Points : 4) MAC DAC RBAC RBOC Question 5.5. (TCO 6) A network administrator wants to be sure that when users change their passwords, they do not reuse a previous password. What domain password policy will need to be configured? (Points : 4) Enforce password history Maximum password age Minimum password age Minimum password length Question 6.6. (TCO 6) A network administrator wants to specify the number of days a password must be used before it can be changed again. What domain password policy will need to be configured? (Points : 4) Enforce password history Maximum password age Minimum password age Minimum password length Question 7.7. (TCO 6) Which of the following can a user control on their system? (Points : 4) Cookies Running JavaScript Running ActiveX Selection of hyperlinks Question 8.8. (TCO 6) Which is a 100% secure method to download applications from the Internet? (Points : 4) Signed applets SSH HTTPS None of the above Question 9.9. (TCO 6) SSMTP uses TCP port (Points : 4) 110. 465. 456. Question 10.10. (TCO 2) HTTPS uses TCP port (Points : 4) 433. 443. 344. 434. Question 11.11. (TCO 2) When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called (Points : 4) vishing. telephishing. phreaking. voicing. Question 12.12. (TCO 8) Which is the law that overhauled the financial accounting standards for publicly traded firms in the United States? (Points : 4) Computer Fraud and Abuse Act Stored Communications Act CAN-SPAM Act Sarbanes-Oxley Act Question 13.13. (TCO 4) Which of the following is not one of the three forms of trust models? (Points : 4) Hybrid Star [Show More]

Last updated: 3 years ago

Preview 1 out of 14 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of SEC280 Information Systems Security-Final Exam (SOLVED) document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$15.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

65
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 03, 2021

Number of pages

14

Written in

All

Seller


Profile illustration for QUIZ HERO
QUIZ HERO

Member since 4 years

0 Documents Sold

Additional information

This document has been written for:

Uploaded

Sep 03, 2021

Downloads

 0

Views

 65

Document Keyword Tags

Recommended For You

Get more on EXAM »

$15.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·