Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Accounting Basics Expert

1. T F Deep packet inspection firewalls protect networks by blocking packets based on the packets header information at the network (IP) layer. Answer: _____ If F, why?
Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications. Answer:
_____

2. T F Intrusion Detection Systems (IDS) provide no protection from internal threats.

Answer: _____

3. T F A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. Answer: _____

Security awareness, training, and education programs are key components of

organizational risk management strategies.

4. T F

Answer: _____

Part 2: Multiple Choice Questions. Print the correct answer in the blank following the

question. (22 questions at 2 points each, 40 points plus 4 bonus points in all)

1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below):
A. Network

B. Physical
applications.
C. Application
D. Transport

1. Coordinates communication between applications.
2. Supports useful functions over the transport layer such identity/location of
3. Moves information between hosts that are not directly connected.
4. Moves bits between the nodes in the network.

a. A--->3; B--->4; C--->2; D--->1
b. A--->2; B--->4; C--->1; D--->4
c. A--->2; B--->3; C--->4; D--->1
d. A--->3; B--->4; C--->1; D--->2
Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:
a. A patent
b. A copyright
c. A trademark
d. Ethical standards
Answer: _____

3. Security threats include which of the following:

Page 2 of 8

a.
b.
c.
d.
e.

Unlocked doors
Disgruntled employees
Hurricanes
Un-patched software programs
All of the above

Answer: _____

4. Denial of service attacks include (select one or more):
a. Buffer overflow attack
b. Smurf attack
c. Ping flood attack
d. SYN flood attack
e. All of the above
Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server. Inside the
utility is code that that will erase the servers hard drive contents on January 1st, 2016. This
is an example of which of the following attacks?
a.
b.
c.
d.
e.
f.
g.

Virus
Logic Bomb
Spoofing
Trojan horse
Botnet
Rootkit
Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process. Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret. They would like to protect this formula for as long as possible. What type of intellectual property protection best suits their needs?
a.
b.
c.
d.

Copyright
Trademark
Patent
Trade Secret

Answer: _______

7. You should clear cookies in your browser periodically because:
a. They (Cookies) can be used to track your web browsing behavior and invade your privacy.
b. They can facilitate impersonation attacks.
c. They can be used to spread viruses.

Page 3 of 8

d. a. & b.
e. b. & c.
f. a., b. & c.
Answer: _________

8.

A TCP/IP session hijacking can be best described as:
a.
b.
c.
d.

Providing false identity information to gain unauthorized access Establishing a connection without specifying a username or password
An attacker takes control of a session between the server and a client Flooding the connection with too many requests

Answer: _________

9. Tracker attacks in databases get around:
a. Anonymization
b. Data transformation
c. Query size restriction
d. Data partitioning
Answer: _________

10. A race condition attack can result in:
a. A symbolic link
b. Object orientation
c. A deadlock
d. Access to low address memory locations
Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.
a. Data perturbation
b. Database access control
c. Inference channeling
d. Output perturbation
Answer: _________

Page 4 of 8

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.
a. compromise
b. inference
c. partitioning
d. query restriction
Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?
a. IPSec
b. HTTP over SSL
c. Link encryption
d. Microsoft Encrypting File System (EFS)

Answer: ______

14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?

a. A firewall system at the connection point to the Internet
b. An improved RBAC-based access control system for the application servers
c. File-level encryption
d. Kerberos authentication
Answer: _______

Page 5 of 8

15. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?
a. A privacy policy
b. An authentication policy
c. An incident response policy
d. Wireless network access policy

Answer: ________

16. The security risk of allowing dynamic content ( to execute) on a target machine is:
a. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.
b. Malware may be included in the downloaded code and infect the target machine.
c. The mobile code author may never be known.
d. None of the above.
Answer: _______

17. Encrypting a message with a private key (of the sender) in an asymmetric system provides:
a. Proof of receipt
b. Confidentiality
c. Proof of origin
d. Message availability
Answer:_______

18. The correct ordering of the upper layers of the OSI model are:
a.
b.
c.
d.

Session, application, presentation
Session, presentation, application
Session, application, presentation, physical
Application, presentation, session, network

Answer: _______
19. In relational database parlance, the basic building block is a __________, which is a flat table.
a.
b.
c.
d.
e.

attribute
tuple
primary key
relation
field

Answer: _____

20. Routers operate at the _____________ of the OSI stack?
Page 6 of 8

a.
b.
c.
d.
e.

Transport
Application
Session
Network

Data Link

Answer: _____

21. Gateways operate at the _____________ of the OSI stack?
a. Transport
b. Application
c. Session
d. Network
e. Data Link
Answer: _____

22. Which e-mail security protocol(s) depend(s) upon a Web of Trust?
a. Kerberos
b. Public Key Infrastructure (PKI)
c. Secure Sockets Layer (SSL)
d. Transport Layer Security (TLS)
e. Pretty Good Privacy (PGP)
f. Secure Multipurpose Internet Mail Extensions (S/MIME)
g. Privacy Enhanced Mail (PEM)
h. Data Link

Answer: _____

Part 3: Short Answer Questions. (2 questions at 15 points each, 30 points in all; no more than 1 page, single-spaced for the answer to each question)
1. Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls

2. There are many threats associated with e-mail. List those threats and describe a mitigation strategy for each.

Part 4: Essay Question.

While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an

Page 7 of 8

elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur than inventor, quickly grasps the essence of Joes idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joes idea, Stan plans to hire a programmer to implement Joes algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this situation.

Accounting Basics, Accounting

  • Category:- Accounting Basics
  • Reference No.:- M91592897
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Accounting Basics

Question -what would you pay for an investment that pays

Question - What would you pay for an investment that pays you $5300000 after fifty years? Assume that the relevant interest rate for this type of investment is 8%. Vaughn Manufacturing makes an investment today (January ...

Question - use the following information for transactions

Question - Use the following information for transactions 18 and 19. You are the SELLER. You sell merchandise on account for $12,000. The merchandise cost you $7,200. The terms are FOB shipping, 2/10, n/30. You receive a ...

Problem - thakin industries inc manufactures dorm furniture

Problem - Thakin Industries Inc. manufactures dorm furniture in separate processes. In each process, materials are entered at the beginning, and conversion costs are incurred uniformly. Production and cost data for the f ...

Question - a fire destroys all of the merchandise of

Question - A fire destroys all of the merchandise of Bridgeport Company on February 10, 2017. Presented below is information compiled up to the date of the fire. Inventory, January 1, 2017$395,100 Sales revenue to Februa ...

Question - a married couple received 7200 of social

Question - A married couple received $7,200 of social security benefits. a - Calculate the taxable amount of those benefits if the couple's provisional income is $33,000. b - Calculate the taxable amount of those benefit ...

Question - flounder company at december 31 2017 the end of

Question - Flounder Company at December 31, 2017, the end of its first year of operations. Sales revenue $282,670 Cost of goods sold 147,300 Selling and administrative expenses 49,900 Gain on sale of plant assets 28,660 ...

Question - on january 1 2007 nichols companys inventory of

Question - On January 1, 2007, Nichols Company's inventory of Item X consisted of 2,000 units that cost $8 each. During 2007 the company purchased 5,000 units of Item X at $10, each, and it sold 4,500 units. Periodic inv ...

Question - hardcastle ltd had sales of 3 000 000 and net

Question - Hardcastle Ltd. had sales of $3 000 000 and net operating income of $900 000. Operating assets during the year averaged $1 500 000. The manager of Hardcastle is considering the purchase of a new machine which ...

Question - the structure of a typical organization is

Question - The structure of a typical organization is similar to a pyramid, with different levels that require one consistent type of information to assist with all managerial decision making. Explain a typical corporati ...

Question - the ward county hospital center wchc wants to

Question - The Ward County Hospital Center (WCHC) wants to buy a new mobile primary care van to use in screening residents in an underserved local neighborhood. The van will last five years and costs sixty-eight thousand ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As