Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 2 AUP stands for? Active Use Personnel All Unscheduled Plans Active Use

ID: 3756314 • Letter: Q

Question

Question 2

AUP stands for?

Active Use Personnel

All Unscheduled Plans

Active User PC

Acceptable Use Policy

1 points

Question 3

An attempt by a threat agent to exploit assets without permission is referred to as:

an attack

a vulnerability

a safeguard

a trade-off

1 points

Question 4

Car ignition Locks are an example of what type of decision:

Requirements Based

Relativistic Based

Rule Based

Hunter’s Dilemma

1 points

Question 5

Which terminology are correct logical opposites?

Authorization and Accountability

Identification and Integrity

Availability and Identification

Confidentiality and Disclosure

1 points

Question 6

Which documentation review definition is NOT correct?

Policy: all servers must be properly hardened by patching and turning off services

Baseline: the specific settings for windows 2003 should match those in the CIS security template

Standard: administrators must use Windows 2003 as the base operating system

Procedures: to ease the application of templates, local GPOs can be used to roll out the changes

1 points

Question 7

A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a:

script kiddy

cracker

black-hat hacker

white-hat hacker

1 points

Question 8

A risk assessment involves which of the following:

identifying risks

prioritizing risks

identifying protection solutions

all the above

1 points

Question 9

A security analyst is performing a security assessment. The analyst should not:

get written authorization from the organization to verify that the assessment should take place

take actions to mitigate a serious risk

protect all working notes

securely erase all collected information that’s not needed for business purposes

1 points

Question 10

What is a worm?

Malware

Send Spam

Blocks flow of computer traffic

Denial of Service

1 points

Question 11

What is the formula for risk?

Threat = risk x vulnerability

vulnerability = threat x risk

risk = threat x vulnerability

1 points

Question 12

Victims can protect themselves against zero-day attacks.

True

False

1 points

Question 13

Which data classification role is responsible for the asset of information that must be protected?

Owner

Custodian

Analyst

Auditor

1 points

Question 14

An example of something you have would be?

GPS

Retina Scans

Passwords

Tokens

1 points

Question 15

OCTAVE is a:

security architecture

code of conduct

risk-assessment process

type of layered defense

1 points

Question 16

When disclosing a security vulnerability in a system or software, the manufacturer should avoid:

patching the system of software

including enough detail to allow an attacker to exploit the vulnerability

notifying customers

all of the answers

1 points

Question 17

Information security does NOT need to be maintained when third parties have access to information.

True

False

1 points

Question 18

________ are the exposure points (gateways) by which threats are manifested.

Vulnerabilities

Threats

Compromises

Risks

1 points

Question 19

The four categories of authentication are something you have, something you are, something you know, and someplace you are.

True

False

1 points

Question 20

People can be threat agents in some cases but trustworthy in others.

True

False

Active Use Personnel

All Unscheduled Plans

Active User PC

Acceptable Use Policy

Explanation / Answer

Please Note: The post contains more than One Question and thus according to the Chegg Answering Guidelines, I should answer the first question here. I have answered the first 4 questions here. For receiving the answers to the rest of the Questions, please Re-post for the other Questions.

Question 2

AUP stands for?

Active Use Personnel

All Unscheduled Plans

Active User PC

Acceptable Use Policy

Answer)

AUP - Acceptable Use Policy.

Question 3

An attempt by a threat agent to exploit assets without permission is referred to as:

an attack

a vulnerability

a safeguard

a trade-off

Answer)

A. an attack - is an attempt by a threat agent to exploit assets without permission.

Question 4

Car ignition Locks are an example of what type of decision:

Requirements Based

Relativistic Based

Rule-Based

Hunter’s Dilemma

Answer)

Rule-Based - an example of Car ignition Locks

Question 5

Which terminology is correct logical opposites?

Authorization and Accountability

Identification and Integrity

Availability and Identification

Confidentiality and Disclosure

Answer)

Confidentiality and Disclosure - is a terminology for correct logical opposites

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote