I have complete test bank for this class quiz message me for testbank
Name_________________________ Date____________________
· There are 30 questions in this Quiz and each question is worth 2 points
· The quiz is worth 10% of your final grade for the course.
· Please provide your answers in the answer table provided in this document
· For multiple choices, select the appropriate letter. For True/False, put either a T or a F. For short answer questions, be very brief but concise. You do not need to describe the background, just offer your contributions to the short answer questions.
· The quiz is due on September 27, 2015, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left.
· The quiz is to be of your own work and no other individuals may assist you in this effort.
· When applicable please provide your own examples to complement your material.
· Please put your name at the top of the document and name your file using this file naming convention: fLastQuizl.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc
· Please submit your work using the Quiz1 link in the Assignment Folder.
· Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves.
TRUE/FALSE QUESTIONS:
1. Assurance is the process of examining a computer product or system with respect to certain criteria
2. The first step in devising security services and mechanisms is to develop a security policy.
3. X.800 architecture was developed as an international standard and focuses on security in the context of networks and communications.
4. Contingency planning is a functional area that primarily requires computer security technical measures.
5. Hardware is the most vulnerable to attack and the least susceptible to automated controls.
6. In the context of security our concern is with the vulnerabilities of system resources.
7. Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system.
MULTIPLE CHOICES QUESTIONS
8. Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system.
A. Trust B. Assurance
C. Evaluation D. Functionality
9. The ________ is the government agency that monitors the evaluation process.
A. sponsor B. certifier
C. evaluator D. developer
10. A _______ is a collection of requirements that share a common focus or intent.
A. trust B. family
C. class D. component
11. The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.
A. BLP B. TC
C. CC D. TPM
12. Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________.
A. polyinstantiation B. ds-property
C. trust D. MAC
13. _________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.
A. TCB B. Trustworthiness
C. Trusted computing D. TPM
14. __________ data are data that may be derived from corporate data but that cannot be used to discover the corporation’s identity.
A. Reference B. Trust
C. Sanitized D. MAC
15. _________ is choosing to accept a risk level greater than normal for business reasons.
A. Risk avoidance B. Reducing likelihood
C. Risk transfer D. Risk acceptance
16. The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.
A. establishing the context B. control
C. risk avoidance D. combining
17. ________ specification indicates the impact on the organization should the particular threat in question actually eventuate.
A. Risk B. Consequence
C. Threat D. Likelihood
18. The results of the risk analysis should be documented in a _________.
A. journal B. consequence
C. risk register D. none of the above
19. _________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.
A. Security controls B. Risk appetite
C. Risk controls D. None of the above
20. A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.
A. vulnerability B. threat
C. risk D. control
21. The _________ approach involves conducting a risk analysis for the organization’s IT systems that exploits the knowledge and expertise of the individuals performing the analysis.
A. baseline B. combined
C. detailed D. informal
FILL-IN THE BLANK QUESTIONS
22. Incident response is part of the ________ class of security controls.
23. Controls can be classified as belonging to one of the following classes: management controls, operational controls, technical controls, detection and recovery controls, preventative controls, and _______ controls.
24. The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically, often as part of a wider, general audit of the organization or whenever changes are made to the organization’s security policy.
25. _________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
Answer Table
1 |
|
2 |
|
3 |
|
4 |
|
5 |
|
6 |
|
7 |
|
8 |
|
9 |
|
10 |
|
11 |
|
12 |
|
13 |
|
14 |
|
15 |
|
16 |
|
17 |
|
18 |
|
19 |
|
20 |
|
21 |
|
22 |
|
23 |
|
24 |
|
25 |
|
SHORT ANSWER QUESTIONS
26. What are the two rules that a reference monitor enforces?
27. What properties are required of a reference monitor?
28. What is polyinstantiation?
29. Briefly describe the three basic services provided by a TPMs.
30. What is the aim of evaluating an IT product against a trusted computing evaluation standard?
Answers
Why Work with Us
Top Quality and Well-Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional and Experienced Academic Writers
We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
Essays
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admissions
Admission Essays & Business Writing Help
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Reviews
Editing Support
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
Reviews
Revision Support
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.