Chat with us, powered by LiveChat Which of the following are the CIA properties? (Select the three correct properties.) Authentication Confidentiality Integ | WriteDen

Which of the following are the CIA properties? (Select the three correct properties.) Authentication Confidentiality Integ

  

1.Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

2. Which of the following is an example of a rule-based security decision?

Locking a car's ignition

Performing a step-by-step security analysis

Applying "security theater"

Trying to outdo a neighbor's security measures

3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

Group of answer choices

True

False

7. An attempt by a threat agent to exploit assets without permission is referred to as

Group of answer choices

An attack

A vulnerability

A safeguard

A trade-off

8. The primary element on a computer motherboard that runs programs and makes the computer work is

Group of answer choices

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

9. ____________ flaws in the software, such as finger service, are often exploited.

Group of answer choices

Buffer overflow

Blue screen of death

Shell shock

Windows

10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Group of answer choices

Gates

Jobs

Moore

Morris

11. True or False? Not all data is strictly numerical.

Group of answer choices

True

False

12. The __________ board contains slots or sockets for random access memory (RAM).

Group of answer choices

Mother

Father

Daughter

Son

13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

Group of answer choices

True

False

14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.

Group of answer choices

True

False

15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Group of answer choices

Cluster

Permission

Capability

Objects

16. The “X” permission on the file indicates that the user has _________ right.

17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.

Group of answer choices

True

False

18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

Group of answer choices

C++

PHP

Javascript

Lisp

19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

Group of answer choices

True

False

20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Group of answer choices

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

21. True or False? Authentication associates an individual with an identity.

Group of answer choices

True

False

22. True or False? Two-factor authentication is using two passwords.

Group of answer choices

True

False

23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

Group of answer choices

True

False

24. The following are fundamental strategies for authenticating people on computer systems, except

Group of answer choices

Something you know

Something you have

Something you are

Something you make

25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user's fingerprint. Which of the following can we add to implement three separate factors?

Group of answer choices

A file of secret information stored on the user's authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user's cell phone

    HOW OUR WEBSITE WORKS

    Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of 
    HIGH QUALITY & PLAGIARISM FREE.

    Step 1

    To make an Order you only need to click ORDER NOW and we will direct you to our Order Page at WriteDen. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
     Deadline range from 6 hours to 30 days.

    Step 2

    Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

    Step 3
    Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

    Is it Safe to use our services?
    We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

    Discounts

    Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

    Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.