Write a password policy that your company will have to


Need Exam satisfied by Due Date

(TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? 
Virus
Hoax
Worm
Trojan

Question 2. 2. (TCO 5) What is best ensured through the use of encryption

 Accounting
Authentication
Authorization
Confidentiality

Question 3. 3. (TCO 5) All of the following techniques help secure IM communications except _____. 
running a corporate IM server
using a different user name
avoiding file transfers
using encryption

Question 4. 4. (TCO 6) What is not an advantage of decentralized management?
The decentralized model is highly flexible, as changes can be made whenever they are needed.
It does not require a dedicated set of personnel and resources.
Bureaucracy is reduced.
A more consistent approach is ensured, as everyone "does it the same way."

Question 5. 5. (TCO 6) A network administrator wants to be sure that, when users change their passwords, they do not reuse a previous password. What domain password policy will need to be configured? 
Enforce password history
Maximum password age
Minimum password age
Minimum password length

Question 6. 6. (TCO 6) Running Java applets from the Web on your system is considered _____. 
a security risk
not risky
somewhat secure
very secure

Question 7. 7. (TCO 6) Which is more secure? 
Common Gateway Interface (CGI)
Server-side scripting
Third-party scripting
All are equally secure.

Question 8. 8. (TCO 6) One way a user can feel confident that the code being downloaded is from a legitimate vendor and has not been modified is with the implementation of _____. 
SSL
Authenticode
SFTP
HTTPS

Question 9. 9. (TCO 6) SSMTP uses TCP port _____. 
25
110
465
456

Question 10. 10. (TCO 2) HTTPS uses TCP port _____.
433
443
344
434

Question 11. 11. (TCO 2) All of the following are characteristics of a strong password except when it _____.
contains numbers and letters
contains at least eight characters
contains an uncommon dictionary word
contains special characters, such as *%$#@

Question 12. 12. (TCO 8) Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection? 
The Sarbanes-Oxley Act
The Digital Millennium Copyright Act
The U.S. Digital Signatures Law
The Computer Fraud and Abuse Act

Question 13. 13. (TCO 4) Which of the following is not one of the three forms of trust models? 
Hybrid
Star
Peer-to-peer
Hierarchical

Question 14. 14. (TCO 4) Which of the following reasons is appropriate for a certificate suspension rather than for revocation? 
All the keys are compromised.
Changed affiliation
An extended vacation
The certificate is no longer needed, but no reason exists to suspect that it has been compromised.

Question 15. 15. (TCO 2) PGP uses _____.
private-key encryption
asymmetric encryption
symmetric encryption
anomalous encryption

Question 16. 16. (TCO 2) HTTPS uses port _____.
80
8080
443
433

Question 17. 17. (TCO 3) Which Transport Layer protocol is connection oriented?
UDP
TCP
IP
ICMP

Question 18. 18. (TCO 3) Which of the following is the term that indicates a hostile activity that does not match an IDS signature and, therefore, goes undetected? 
Detection failure
False alert
False negative
False positive

Question 19. 19. (TCO 3) Packet delivery to distant systems is usually accomplished by the use of _____.
MAC addresses
domain names
IP addresses
ARP protocol

Question 20. 20. (TCO 3) A network that lies completely inside the trusted area of a network and is under the security control of the system and network administrators is referred to as the _____. 
DMZ
Intranet
Extranet
Internet

Question 21. 21. (TCO 3) A logical implementation of a LAN that allows computers connected to different physical networks to act and communicate as if they are on the same physical network is referred to as a _____.
DMZ
VLAN
Extranet
Tunnel

Question 22. 22. (TCO 6) You are building a small network in an office. You need to connect two different network segments that have different network addresses. What device will you use to connect them? 
A hub
A router
A switch
A server

Question 23. 23. (TCO 6) A hub operates at _____. 
Layer 1, the Physical Layer
Layer 2, the Data Link Layer
Layer 2, the MAC Layer
Layer 3, the Network Layer

Question 24. 24. (TCO 6) What protocol is used to manage IP address space? 
ICMP
DHCP
TCP
SNMP

Question 25. 25. (TCO 6) Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?
Mandatory access control
Discretionary access control
Role-based access control
Rule-based access control

Write a password policy that your company will have to follow to ensure strong passwords.
Describe some of the types of attacks that can be launched against a network.
What is a DMZ, and what is it used for?
List three kinds of information contained in an IP packet header.
What laws protect the recording industry from digital piracy?
Describe the laws that govern digital signatures.
Explain some of the problems with PGP.
What are content- and context-based signatures? Which is best to use and why?
What are the four common methods for connecting equipment at the Physical Layer?
Evaluate the difference between a public CA and a private CA.
What is PII as it relates to privacy?
What are some Web-related privacy issues?
What is the importance of a baseline to change management?
What are the essential elements of change management?
What laws govern computer access and trespass? 

Request for Solution File

Ask an Expert for Answer!!
Accounting Basics: Write a password policy that your company will have to
Reference No:- TGS0572288

Expected delivery within 24 Hours