SEC 571 Week 1 Quiz | Devry University

SEC 571 Week 1 Quiz | Devry University

Week 1: Quiz 

Question 1

 (TCO A) Describe an organizational information situation where data confidentiality would be more 

Question 2

 (TCO A) Which of the following is the weakest password?  

·         rT%b9

·         2a$xY60

·         vG&3n9c

·         8d$iuR4 

·         %s94Nd6 

Question 3

 (TCO A) While our focus in the course is on threats to information systems, this question focuses on the concept of threats, vulnerabilities, and controls as applied to other kinds of systems. Select two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created and assess the effectiveness of these controls giving the justification for your assessment. Your answer does not need to address information security but you need to demonstrate your understanding of the terms: threat, vulnerability, and control. (Note: specific answers to this question are not in the assigned reading material.) ? 

Question 4

 (TCO A) Explain the terms false positive and false negative in the context of using biometrics in authentication. 

Question 5

 (TCO A) Nmap uses _________________to perform network enumeration.  

·         ports 

·         IP addresses

·         MAC addresses  

·         fully qualified domain names 

Question 6

 (TCO A) Virtualization is an operating system security technique. In the context of virtualization, explain what honeypot does.

 

Answer Detail

Get This Answer

Invite Tutor