100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ENG2611 OCTOBER/NOVEMBER EXAMINATION PORTFOLIO DUE DATE:23/10/24

Puntuación
-
Vendido
-
Páginas
6
Grado
A+
Subido en
21-10-2024
Escrito en
2024/2025

ENG2611 OCTOBER/NOVEMBER EXAMINATION PORTFOLIO DUE DATE:23/10/24

Institución
ENG2611
Grado
ENG2611









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ENG2611
Grado
ENG2611

Información del documento

Subido en
21 de octubre de 2024
Número de páginas
6
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ENG2611 OCTOBER/NOVEMBER EXAMINATION
PORTFOLIO DUE DATE:23/10/24



A security policy is important for all of the following reasons except which one? -
(ANSWER)With it, you cannot trust the network's security.


When conducting an audit, the auditor should be which of the following? - (ANSWER)An
external person who is independent of the organization under audit


Which of the following characteristics relates to a demilitarized zone (DMZ)? - (ANSWER)A
type of perimeter network used to host resources designated as accessible by the public from the
Internet


Which term describes an object, computer, program, piece of data, or other logical or physical
component you use in a business process to accomplish a business task? - (ANSWER)Asset


Which of the following refers to a form of encryption also known as point-to-point or host-to-
host encryption? - (ANSWER)Transport mode encryption


Which of the following is not a consideration when placing firewalls on the network? -
(ANSWER)Where hackers are located


Which of the following is a malicious software program distributed by a hacker to take control of
a victim's computers? - (ANSWER)Agent


Which name is given to a VPN created between a client and a server either within the same local
network or across a WAN link or intermediary network to support secure client interaction with
the services of a resource host? - (ANSWER)Client-to-server VPN

, Which of the following characteristics relates to the term algorithm? - (ANSWER)A set of rules
and procedures—usually mathematical in nature—that can define how the encryption and
decryption processes operate


Which term describes the process of converting ciphertext back into plain text? -
(ANSWER)Decryption


Which of the following terms describes hiding information from unauthorized third parties? -
(ANSWER)Cryptography


Which term is a form of exploitation in which an unauthorized or rogue DNS server responds to
DNS queries with false resolutions? - (ANSWER)DNS spoofing


Which term describes a form of security defense that focuses on discouraging a perpetrator with
physical harm, social disgrace, and legal consequences? - (ANSWER)Deterrent


Which of the following refers to the malicious insertion of scripting code onto a vulnerable Web
site? - (ANSWER)Cross-site scripting (XSS)


Which of the following is not a type of malware? - (ANSWER)Chip creep


Which of the following refers to the end user's desktop devices such as a desktop computer,
laptop, VoIP telephone, or other endpoint device? - (ANSWER)Workstation Domain


Which of the following describes a BYOD? - (ANSWER)A policy allowing or encouraging
employees, contractors, and others to connect their own computers, smartphones, and other
devices to their organization's networks


What attack cracks a password or encryption key by trying all possible valid combinations from
a defined set of possibilities (a set of characters or hex values)? - (ANSWER)Brute-force attack


Which of the following is not a step in an incident response solution? - (ANSWER)Evasion
$5.69
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
tivakiok HAVARD UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
23
Miembro desde
1 año
Número de seguidores
2
Documentos
1010
Última venta
2 meses hace

3.1

7 reseñas

5
3
4
1
3
0
2
0
1
3

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes