100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
26-08-2024
Written in
2024/2025

ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers began to examine the feasibility of redundant networked communications - Correct AnswerAdvanced Research Projects Agency (ARPA) Developed the ARPANET (a network project that preceded the Internet) from its inception - Correct Answer- Dr. Larry Roberts What happened in 1968? - Correct Answer- Maurice Wilkes discusses password security in Time - Sharing Computer Systems

Show more Read less
Institution
ESOC 477
Course
ESOC 477









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ESOC 477
Course
ESOC 477

Document information

Uploaded on
August 26, 2024
Number of pages
13
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

ESOC 477 FINAL REVIEW UPDATED
Exam Questions and CORRECT Answers

began to examine the feasibility of redundant networked communications - Correct Answer-
Advanced Research Projects Agency (ARPA)


Developed the ARPANET (a network project that preceded the Internet) from its inception -
Correct Answer- Dr. Larry Roberts


What happened in 1968? - Correct Answer- Maurice Wilkes discusses password security in
Time - Sharing Computer Systems


What happened in 1970? - Correct Answer- Willis H. Ware authors the report Security
Controls for Computer Systems: Report of Defense Science Board Task Force on Computer
Security—RAND R.609 which was not declassified until 1979. It became known as the
seminal work identifying the need for computer Security


What happened in 1973? - Correct Answer- Schell, Downey, and Popek examine the need for
additional security in military systems in Preliminary Notes on the Design of Secure Military
Computer Systems


What happened in 1975? - Correct Answer- The Federal Information Processing Standards
(FIPS) examines DES (Digital Encryption Standard) In the Federal Register


What happened in 1978? - Correct Answer- Bisbey and Hollingsworth publish their study
"Protection Analysis: Final Report," which discussed the Protection Analysis project created
by ARPA to better understand the vulnerabilities of operating system security and examine
the possibility of automated vulnerability detection techniques in existing system software


When it is the subject of an attack? - Correct Answer- the computer is used as an active tool
to conduct attack


When it is the object of an attack - Correct Answer- the computer is the entity being attacked

, A computer can be? - Correct Answer- First be object, then - subject


senior management, responsible for the security and use of a particular set of information -
Correct Answer- Data owners


responsible for the information and systems that process, transmit, and store it. (IS/IT
practitioners) - Correct Answer- Data custodians


individuals, also with some information security role - Correct Answer- Data users


Information security performs four important functions for an organization: - Correct
Answer- -Protecting the organization's ability to function


-Protecting the data and information the organization collects and uses


-Enabling the safe operation of applications running on the organization's IT systems


-Safeguarding the organization's technology assets


can erode consumer confidence, diminishing organization's sales, net worth, and reputation -
Correct Answer- Web site defacing


a much more sinister form of hacking: the premeditated, politically motivated attacks against
information, computer systems, computer programs, and data that result in violence against
noncombatant targets by the state-sponsored/(sub)national groups or clandestine agents -
Correct Answer- Cyberterrorism/Cyberwarfare


It includes the execution of viruses, worms, Trojan horses, and active Web scripts with the
intent to destroy or steal information - Correct Answer- Malware (malicious code)


It consists of code segments that attach to existing program and take control of access to the
targeted computer - Correct Answer- Virus

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1047
Member since
1 year
Number of followers
100
Documents
68977
Last sold
4 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

166 reviews

5
72
4
30
3
42
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions