Information Technology > EXAM > SEC280 Information Systems Security-Final Exam (SOLVED) (All)
SEC280-FinalExamSEC280 Information Systems Security-Final Exam (SOLVED) 1. (TCO 5) Unsolicited commercial e-mail is known as _____. (Points : 4) hoax e-mail worm spam spork Question 2.2. (TCO 5) ... Two tools that can be used to encrypt e-mail are _____. (Points : 4) MIME/S and PGP PGP and S/MIME PSP and MIME/S PGP and SIME Question 3.3. (TCO 5) One of the largest security problems with IM programs is _____. (Points : 4) their inability to share files the lack of support for encryption the lack of support for video the lack of support for hiding online presence Question 4.4. (TCO 6) What is the name of the process that controls access to information based on the sensitivity of that information and whether or not the user is operating at the appropriate sensitivity level and has the authority to access that information? (Points : 4) MAC DAC RBAC RBOC Question 5.5. (TCO 6) A network administrator wants to be sure that when users change their passwords, they do not reuse a previous password. What domain password policy will need to be configured? (Points : 4) Enforce password history Maximum password age Minimum password age Minimum password length Question 6.6. (TCO 6) A network administrator wants to specify the number of days a password must be used before it can be changed again. What domain password policy will need to be configured? (Points : 4) Enforce password history Maximum password age Minimum password age Minimum password length Question 7.7. (TCO 6) Which of the following can a user control on their system? (Points : 4) Cookies Running JavaScript Running ActiveX Selection of hyperlinks Question 8.8. (TCO 6) Which is a 100% secure method to download applications from the Internet? (Points : 4) Signed applets SSH HTTPS None of the above Question 9.9. (TCO 6) SSMTP uses TCP port (Points : 4) 110. 465. 456. Question 10.10. (TCO 2) HTTPS uses TCP port (Points : 4) 433. 443. 344. 434. Question 11.11. (TCO 2) When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called (Points : 4) vishing. telephishing. phreaking. voicing. Question 12.12. (TCO 8) Which is the law that overhauled the financial accounting standards for publicly traded firms in the United States? (Points : 4) Computer Fraud and Abuse Act Stored Communications Act CAN-SPAM Act Sarbanes-Oxley Act Question 13.13. (TCO 4) Which of the following is not one of the three forms of trust models? (Points : 4) Hybrid Star [Show More]
Last updated: 3 years ago
Preview 1 out of 14 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 03, 2021
Number of pages
14
Written in
All
This document has been written for:
Uploaded
Sep 03, 2021
Downloads
0
Views
65
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·