Quiz 1 infa 610 foundations of information security and assurance

I have complete test bank for this class quiz message me for testbank

 

 

Name_________________________                                    Date____________________

 

·       There are 30 questions in this Quiz and each question is worth 2 points

·       The quiz is worth 10% of your final grade for the course.

·       Please provide your answers in the answer table provided in this document

·       For multiple choices, select the appropriate letter. For True/False, put either a T or a F. For short answer questions, be very brief but concise. You do not need to describe the background, just offer your contributions to the short answer questions.

·       The quiz is due on September 27, 2015, 11:59 US EDT. Early submission is encouraged and is welcomed. There will be a 20% penalty for every day late (less than or equal 24 hours is considered a day) until no points are left.

·       The quiz is to be of your own work and no other individuals may assist you in this effort.

·       When applicable please provide your own examples to complement your material.

·       Please put your name at the top of the document and name your file using this file naming convention: fLastQuizl.doc, e.g. the Quiz 1 file name for me would be aGhafarianQuiz1.doc

·       Please submit your work using the Quiz1 link in the Assignment Folder.

·       Use Cybercafé to post your questions about the Quiz but no questions about the questions themselves.

 

TRUE/FALSE QUESTIONS:

1.     Assurance is the process of examining a computer product or system with respect to certain criteria

2.     The first step in devising security services and mechanisms is to develop a security policy.

3.     X.800 architecture was developed as an international standard and focuses on security in the context of networks and communications.

4.     Contingency planning is a functional area that primarily requires computer security technical measures.

5.     Hardware is the most vulnerable to attack and the least susceptible to automated controls.

6.     In the context of security our concern is with the vulnerabilities of system resources.

7.     Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system.

MULTIPLE CHOICES QUESTIONS

8.     Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system.

A.  Trust                      B.  Assurance

C.  Evaluation              D.  Functionality

 

9.     The ________ is the government agency that monitors the evaluation process.

A.  sponsor                  B.  certifier

            C.  evaluator                D.  developer

 

10.  A _______ is a collection of requirements that share a common focus or intent.

A.  trust                                   B.  family

 

C.  class                        D.  component

 

11.  The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.

A.  BLP                       B.  TC

C.  CC                          D.  TPM

 

12.  Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________.

A.  polyinstantiation    B.  ds-property

C.  trust                                    D.  MAC

 

13.  _________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.

            A.  TCB                       B.  Trustworthiness

C.  Trusted computing  D.  TPM

 

14.  __________ data are data that may be derived from corporate data but that cannot be used to discover the corporation’s identity.

      A.  Reference               B.  Trust

C.  Sanitized                 D.  MAC

 

 

15.  _________ is choosing to accept a risk level greater than normal for business reasons.

      A.  Risk  avoidance        B.  Reducing likelihood

C.  Risk transfer           D.  Risk acceptance

 

 

 

16.  The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.

            A.  establishing the context                  B.  control

C.  risk avoidance                                 D.  combining

 

 

17.  ________ specification indicates the impact on the organization should the particular threat in question actually eventuate.

            A.  Risk                                    B.  Consequence

C.  Threat                                D.  Likelihood

 

 

18.  The results of the risk analysis should be documented in a _________.

            A.  journal                                B.  consequence

C.  risk register                         D.  none of the above

 

 

19.  _________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.

            A.  Security controls                B.  Risk appetite

C.  Risk controls                      D.  None of the above

 

 

20.  A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.

            A.  vulnerability                       B.  threat

C.  risk                                     D.  control

 

21.  The _________ approach involves conducting a risk analysis for the organization’s IT systems that exploits the knowledge and expertise of the individuals performing the analysis.

            A.  baseline                  B.  combined

C.  detailed                   D.  informal

 

 

FILL-IN THE BLANK QUESTIONS

22.  Incident response is part of the ________ class of security controls.

23.  Controls can be classified as belonging to one of the following classes:  management controls, operational controls, technical controls, detection and recovery controls, preventative controls, and _______ controls.

24.  The ________ audit process should be conducted on new IT systems and services once they are implanted; and on existing systems periodically, often as part of a wider, general audit of the organization or whenever changes are made to the organization’s security policy.

25.  _________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.

Answer Table

1

  

2

 

3

 

4

 

5

 

6

 

7

 

8

 

9

 

10

 

11

 

12

 

13

 

14

 

15

 

16

 

17

 

18

 

19

 

20

 

21

 

22

 

23

 

24

 

25

 

SHORT ANSWER QUESTIONS

26.  What are the two rules that a reference monitor enforces?

27.  What properties are required of a reference monitor?

28.  What is polyinstantiation?

29.  Briefly describe the three basic services provided by a TPMs.

30.  What is the aim of evaluating an IT product against a trusted computing evaluation standard?

Answers

 

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Choose Us

Quality Papers

We value our clients. For this reason, we ensure that each paper is written carefully as per the instructions provided by the client. Our editing team also checks all the papers to ensure that they have been completed as per the expectations.

Professional Academic Writers

Over the years, our Acme Homework has managed to secure the most qualified, reliable and experienced team of writers. The company has also ensured continued training and development of the team members to ensure that it keep up with the rising Academic Trends.

Affordable Prices

Our prices are fairly priced in such a way that ensures affordability. Additionally, you can get a free price quotation by clicking on the "Place Order" button.

On-Time delivery

We pay strict attention on deadlines. For this reason, we ensure that all papers are submitted earlier, even before the deadline indicated by the customer. For this reason, the client can go through the work and review everything.

100% Originality

At Buy An Essay, all papers are plagiarism-free as they are written from scratch. We have taken strict measures to ensure that there is no similarity on all papers and that citations are included as per the standards set.

Customer Support 24/7

Our support team is readily available to provide any guidance/help on our platform at any time of the day/night. Feel free to contact us via the Chat window or support email: support@acmehomework.com.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Buy An Essay has stood as the world’s leading custom essay writing services providers. Once you enter all the details in the order form under the place order button, the rest is up to us.

Essays

Essay Writing Services

At Buy An Essay, we prioritize on all aspects that bring about a good grade such as impeccable grammar, proper structure, zero-plagiarism and conformance to guidelines. Our experienced team of writers will help you completed your essays and other assignments.

Admissions

Admission and Business Papers

Be assured that you’ll definitely get accepted to the Master’s level program at any university once you enter all the details in the order form. We won’t leave you here; we will also help you secure a good position in your aspired workplace by creating an outstanding resume or portfolio once you place an order.

Editing

Editing and Proofreading

Our skilled editing and writing team will help you restructure you paper, paraphrase, correct grammar and replace plagiarized sections on your paper just on time. The service is geared toward eliminating any mistakes and rather enhancing better quality.

Coursework

Technical papers

We have writers in almost all fields including the most technical fields. You don’t have to worry about the complexity of your paper. Simply enter as much details as possible in the place order section.