Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Hash function takes a string of any length as input and produces a fixed leng

ID: 3841662 • Letter: 1

Question

1. Hash function takes a string of any length as input and produces a fixed length string which acts as a kind of "signature" for the data provided. a. True False 2. What is the Intermet opportunities to Elicit ersonal Information? a. Online registration forms b. Quizzes and surveys c. Cookie files d. All of the above e. None of the above 3. Any machine that is used in a public area, office environment or at home shared by multiple people, a store will leave a cookie on the machine, and someone could later try to purchase something from the store using existing account. Stores usually post large warnings about this problem. Even so, mistakes can happen. "one-click" shop button may result in undesired shopping and charges. b, False 4. Except with the planning that must occur to prepare the Incident Response teams to be ready to react to an incident, an Incident Response is more reactive, than proactive. a. True b. False 5. Which of the following can be used to compromise your system security: a. Reconnaissance attacks b. Access attacks. c. Denial of service attacks d. Worm, Viruses and Trojan horses 6. e. All of the above with Disaster Recovery Planning when Business Continuity Planning occurs concurrently the damage is major or long term, requiring more than simple restoration of information and information resources a. True b, False 7. For an organization policy to be enforceable, it must be: a. Readily available to all employees b. Easily understood by some employees c. Acknowledged by most of the employees d. Readily available; Easily understood and Acknowledged by employees 8. The e. None of the above password on a best way to store passwords is to hash them first. When you create a secure system, it hashes the password before it's stored. It does not store your actual password. It stores the hash of the password and forgets what you actually typed.Them the next time you type in your password, it hashes what you type in and checks it against

Explanation / Answer

Note : Entitled to answer only 4 sub questions. Please post the others seperately

1. True.
Hash function generates a unique hash for any given input. Mathematically speaking, it maps a larger or infinite domain into a smaller/finite domain.

2. All the above.
Online registration forms - Internet users are asked to sign up and become members to access the site.
Quizzes and Surveys - To find out the user choices and preferences.
Cookie Files - Can be used to track the user's activities

3. True
Sometimes when the users might forget to sign-out of their account on the public machines and their accounts can be used to do wrong things. This is usually a significant problem these days.

4. True
Incident response team focuses on detecting and correcting the impact of an incident. Prevention is purposefully emitted because it is more of a function of security than response.

5. All of them
All the attacks mentioned there compromises the system security.