er.edu/webapps/assessment/take/launch jsp?course ssessment id-445450.18xcourse Q
ID: 3702328 • Letter: E
Question
er.edu/webapps/assessment/take/launch jsp?course ssessment id-445450.18xcourse Question 10 Waln sharcholdars are cticily concemed wh mincin po i nonprice id-274593.1&kcontent; id- 19993974 18step rf health, and salety issues O True O False bates coc e concem, the Question 11 2 pointsSave Answer A Syn flood attack is an older kind of DoS attack and is no longer used O True O False 2 points Save Answer and network systems, an Acceptable use policies (AUPs) document Question 12 As a statement of formal written policies describing employ ee behavior when using company computer is an important tool to create a legal partnership between the employer and employee True O False 2 points Save Answer Question 13 The goal of backing up data is to be able to store t at an off-site location in case something comeromisen the original data False 2 points Save Answer Question 14 By addressing CBFs DRPs help ensure that critical servers and services contin True False 43 PM arch DOLLExplanation / Answer
10. Area of focus for Government:
As Per US Constitution:
Area of focus for Business:
These key aspects results in maximizing profit and maintaining a healthy stock. TRUE
11. Working of a DoS network:
DoS stands for Denial of Service. DoS attack prevents authorized users from accessing the network by using system resources. DoS attack are easy to execute aand difficult to eliminate.
SYN Flood:
SYN flood attack exploits the TCP three way handshake. Malicious host generates a large amount of SYN requests(more than 1000) to the victim server. The server responses with SYN-ACK(Acknowledgement) signal to malicious host but never receives response. This process continues until server runs out of its resources. Thus genuine request goes unhandled.
Ways to mitigate SYN attacks:
Thus with the given demerits SYN attack is no longer in use
TRUE
12. The employment relationship is the legal binding between employers and employees. It exists when a person performs work or services under certain conditions for remuneration or income.
The statment of formal polices act as a legal binding on employee as well as employer. The terms of service, behaviour and code of conduct are specified in this statement. TRUE
13. The process of backing up data is the copying and archiving data so that it can be used when the original data is currupted or lost. Back up protects accidental loss of user data, database corruption, hardware failures, and even natural disasters. Its main objective is to maintain data integrity and consistency. TRUE
14. Critical Business Functions (CBFs): A CBF is any function that is considered vital to organization. If the organization loses the ability to perform CBF. It loses the ability to perform mission critical operations.
Disaster Recovery Plan (DRP): A plan to restore a critical business process or system to operation after disaster. DRP is used to respond various types of disasters i.e., Earthquake, Tsunami, Hurricane. DRP is used to rebuild system after a hardware or software failure.
A DRP adresses mission critical operation. Critical business function support these operations. Specific servers and services support the CBFs. Thus, By addressing CBFs, DRP help ensure that critical servers and services continues. TRUE
PS: If you have any doubts do post in comments. Thanks!!!
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.