Académique Documents
Professionnel Documents
Culture Documents
http://www.spinwoop.com/?download=devry-sec280-final-exam-latest
Question :
Student Answer:
Instructor
Explanation:
Points Received:
page 75
4 of 4
Comments:
Question 2
.
Question :
Student Answer:
Instructor
Explanation:
page 68
Points Received:
4 of 4
Comments:
Question 3
.
Question :
Student Answer:
trash rummaging
garbage surfing
piggy diving
dumpster diving
Instructor
Explanation:
Points Received:
Comments:
page 74
4 of 4
Question 4
.
Question :
Student Answer:
Instructor
Explanation:
Points Received:
page 161
0 of 4
Comments:
Question 5
.
Question :
Student Answer:
Instructor
Explanation:
page 173
Points Received:
4 of 4
Comments:
Question 6
.
Question :
Student Answer:
Instructor
Explanation:
Points Received:
pages 164-165
4 of 4
Comments:
Question 7
.
Question :
Student Answer:
local-area network
office-area network
wide-area network
internal-area network
Instructor
Explanation:
Points Received:
page 205
4 of 4
Comments:
Question 8
.
Question :
Student Answer:
Instructor
Explanation:
page 210
Points Received:
4 of 4
Comments:
Question 9
.
Question :
Student Answer:
Instructor
Explanation:
Points Received:
pages 211-212
4 of 4
Comments:
Question 10
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
pages 217-218
4 of 4
Comments:
Question 11.
Question
:
Student Answer:
UDP
TCP
IP
ICMP
Instructor
Explanation:
page 210
Points Received:
4 of 4
Comments:
Question 12
.
Question
:
Student Answer:
UDP
TCP
IP
ICMP
Instructor
Explanation:
Points Received:
page 210
4 of 4
Comments:
Question 13
.
Question
:
Student Answer:
00:07:H9:c8:ff:00
00:39:c8:ff:00
00:07:e9:c8:ff:00
00:07:59:c8:ff:00:e8
Instructor
Explanation:
Points Received:
page 213
4 of 4
Comments:
Question 14
.
Question
:
Student Answer:
centralized infrastructure
decentralized infrastructure
hybrid infrastructure
peer-to-peer infrastructure
Instructor
Explanation:
page 132
Points Received:
4 of 4
Comments:
Question 15
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
page 135
4 of 4
Comments:
Question 16
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
page 139
4 of 4
Comments:
Question 17
.
Question
:
Student Answer:
confidentiality
integrity
availability
authentication
Instructor
Explanation:
pages 104-109
Points Received:
4 of 4
Comments:
Question 18
.
Question
:
Student Answer:
authentication
nonrepudiation
confidentiality
auditing
Instructor
Explanation:
Points Received:
page 104
4 of 4
Comments:
Question 19
.
Question
:
Student Answer:
confidentiality
integrity
authentication
nonrepudiation
Instructor
Explanation:
Points Received:
page 104
4 of 4
Comments:
Question 20
.
Question
:
Student Answer:
Instructor
Explanation:
page 233
Points Received:
4 of 4
Comments:
Question 21
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
page 229
4 of 4
Comments:
Question 22
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
page 606
4 of 4
Comments:
Question 23
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
page 608
4 of 4
Comments:
Question 24
.
Question
:
Student Answer:
Instructor
Explanation:
page 603
Points Received:
4 of 4
Comments:
Question 25
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
page 601
0 of 4
Comments:
Student Answer:
Instructor
Explanation:
page 71
An e-mail is sent that gets a user to delete critical system files.
Points Received:
9 of 10
Comments:
Question 2
.
Question :
Student Answer:
Instructor
Explanation:
(TCO 2) List the four ways backups are conducted and stored.
Points Received:
10 of 10
Comments:
Question 3
.
Question :
Student Answer:
Instructor
Explanation:
Points Received:
Comments:
Fire
Flood
Tornado
Hurricane
Electrical storm
Earthquake
Political unrest
Blizzard
Gas leak/explosion
Chemical spill
Terrorism
War
10 of 10
Question 4
.
Question :
Student Answer:
Instructor
Explanation:
pages 495-497
Backups should include the organizations critical data, and
critical software as well. Backups may be conducted by backing
up all files (full backup), only the files that have changed since
the last full backup (differential backup), only the files that have
changed since the last full or differential backup (incremental
backup), or only the portion of the files that has changed since the
last delta or full backup (delta backup). Backups should be stored
both on-site for quick access if needed, as well as off-site in case a
disaster destroys the primary facility, its processing equipment,
and the backups that are stored on-site.
Points Received:
10 of 10
Comments:
Question 5
.
Question :
Student
Answer:
page 77
The following are examples:
Instructor
Explanation:
Points Received:
5 of 10
Comments:
Question 6
.
Question :
Student Answer:
Instructor
Explanation:
Points Received:
10 of 10
Comments:
Question 7
.
Question :
Student Answer:
Instructor
Explanation:
Points Received:
10 of 10
Comments:
Question 8
.
Question :
Student Answer:
Instructor
Explanation:
(TCO 4) What are the laws that govern encryption and digital
rights management?
Points Received:
10 of 10
Comments:
Question 9
.
Question :
Student Answer:
Instructor
Explanation:
pages 607-608
Digital signatures have the same legal status as written signatures.
Digital signatures use PINs or other secrets that require enduser protection to be protected from fraud.
Points Received:
10 of 10
Comments:
Question 10
.
Question
:
Student Answer:
Instructor
Explanation:
page 245
Coaxial cable, twisted-pair cable, fiber-optics, and wireless
Points Received:
10 of 10
Comments:
Question 11.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
Comments:
10 of 10
Question 12
.
Question
:
Student Answer:
Instructor
Explanation:
pages 446-447
SSL and TLS use a combination of symmetric and asymmetric
cryptographic methods to secure traffic. Before an SSL session
can be secured, a handshake occurs to exchange cryptographic
information and keys.
Points Received:
10 of 10
Comments:
Question 13
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
10 of 10
Comments:
Question 14
.
Question
:
Student Answer:
Instructor
Explanation:
page 611
Ethics is the social-moral environment in which a person makes
decisions. Ethics can vary by sociocultural factors and groups.
Points Received:
10 of 10
Comments:
Question 15
.
Question
:
Student Answer:
Instructor
Explanation:
Points Received:
Comments:
pages 564-566
Password policies are sets of rules that help users select, employ,
and store strong passwords. Tokens combine something you
have with something you know, such as a password or PIN,
and can be hardware- or software-based. Passwords should have a
limited span and should expire on a scheduled basis.
10 of 10