Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Questions are multiple choice and fill-in. Select the best answer by circling th

ID: 3581791 • Letter: Q

Question

Questions are multiple choice and fill-in. Select the best answer by circling the best multiple choice answer. Fill-in is a short response.

1.   Recently, there was an outbreak of a computer virus, known as the Melissa virus. The FBI is determining whether the virus meets the requirements in the criminal code for an investigation. Which legal justification should be used by the FBI to pursue this matter?
a.   Creation of computer viruses are illegal.
b.   Approval from Microsoft was not granted using Microsoft’s Outlook program to spread the virus.
c.   The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer.

2.   As a systems administrator, where can you go, On-Line, to obtain solutions to computer viruses.
a.   Federal Bureau of Investigation (FBI)
b.   National Security Agency
c.   Carnegie Mellon’s Computer Emergency Response Team (CERT)
d.   John’s Hopkins Applied Physics Laboratory

3.   The Electronic Communications Privacy Act includes all of the following statements except:
a.   Forbids trespass by all persons and businesses, not just government, where they “obtain or alter data, or prevent authorized access
b.   Requires intent to defraud
c.   Does not require a specified minimum dollar value of damages
d.   Up to one year in prison and US$ 250K fines if for personal or commercial gain

4.   In 1992, Federal law enforcement agents arrested five members of a hacker group. They were charged with breaking into the personnel department’s computer system and changing some evaluations. What was the computer security threat in this scenario?
a.   Fraud
b.   Data Modification
c.   Theft

5.   The article “Tale of a Virus Attack” emphasizes which aspect of Information Security?
a.     Legal Issues
a.   Risk Management
b.   Response and Recovery
c.   Access Control

6.   Select the security service not provided by PKI technology.
a.   Non-repudiation
b.   Digital Signatures
c.   Biometric I&A
d.   Key recovery capability

Explanation / Answer

Please follow the data and description :

1)

Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-mail program, causes the virus to be resent to the first 50 people in each of the user's address books.

So the answer is OPTION C(The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer.)

2)

Computer emergency response teams (CERT) are expert groups that handle computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT).

So the answer is OPTION C (Carnegie Mellon’s Computer Emergency Response Team (CERT))

3)

Answer is OPTION C (Does not require a specified minimum dollar value of damages).

4)

Changing the valuable data of an organisation or even a personal system includes the act of data modification. So the answer is OPTION B (Data Modification)

5)

The article “Tale of a Virus Attack” emphasizes the act of Response and Recovery.

So the answer is OPTION B (Response and Recovery).

6)

A public key infrastructure (PKI) is the combination of software, encryption technologies, processes, and services that enable an organization to secure its communications and business transactions. The ability of a PKI to secure communications and business transactions is based on the exchange of digital certificates between authenticated users and trusted resources.

So the answer is OPTION D (Key recovery capability).


Hope this is helpful.