SEC 571 Week 1 Quiz | Devry University
- Devry University / SEC 571
- 17 Dec 2021
- Price: $10
- Computer Science Assignment Help / Networking Assignment Help
SEC 571 Week 1 Quiz | Devry University
Week 1: Quiz
Question 1
(TCO A) Describe an organizational information situation where data confidentiality would be more
Question 2
(TCO A) Which of the following is the weakest password?
· rT%b9
· 2a$xY60
· vG&3n9c
· 8d$iuR4
· %s94Nd6
Question 3
(TCO A) While our focus in the course is on threats to information systems, this question focuses on the concept of threats, vulnerabilities, and controls as applied to other kinds of systems. Select two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created and assess the effectiveness of these controls giving the justification for your assessment. Your answer does not need to address information security but you need to demonstrate your understanding of the terms: threat, vulnerability, and control. (Note: specific answers to this question are not in the assigned reading material.) ?
Question 4
(TCO A) Explain the terms false positive and false negative in the context of using biometrics in authentication.
Question 5
(TCO A) Nmap uses _________________to perform network enumeration.
· ports
· IP addresses
· MAC addresses
· fully qualified domain names
Question 6
(TCO A) Virtualization is an operating system security technique. In the context of virtualization, explain what honeypot does.