Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1. 1. (TCO 2) Your boss saw a TV show that mentioned the term \"social

ID: 674220 • Letter: Q

Question

Question 1.1. (TCO 2) Your boss saw a TV show that mentioned the term "social engineering." He or she wants to know what it is and how it might be used against the company. (Points : 10)

Question 2.2. (TCO 2) List the four ways backups are conducted and stored. (Points : 10)

Question 3.3. (TCO 2) List at least five types of disasters that can damage or destroy the information of an organization. (Points : 10)

Question 4.4. (TCO 2) What are the various ways a backup can be conducted and stored? (Points : 10)

Question 5.5. (TCO 2) Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be. Create a bulleted list of those responsibilities. (Points : 10)

Question 6.6. (TCO 3) How does PGP work? (Points : 10)

Question 7.7. (TCO 3) What is NAT and what is it used for? (Points : 10)

Question 8.8. (TCO 4) What are the laws that govern encryption and digital rights management? (Points : 10)

Question 9.9. (TCO 5) Briefly give two examples of how hoax e-mails work. (Points : 10)

Question 10.10. (TCO 6) What are the different types of removable media? (Points : 10)

Question 11.11. (TCO 6) Explain very simply how biometrics works. (Points : 10)

Question 12.12. (TCO 6) Describe the functioning of the SSL/TLS suite. (Points : 10)

Question 13.13. (TCO 6) As a network administrator, what are some of the options you have for providing secure file transfer? (Points : 10)

Question 14.14. (TCO 7) What are the differences between user, group, and role management? (Points : 10)

Question 15.15. (TCO 9) What are password and domain password policies

Question 1.1. (TCO 2) Your boss saw a TV show that mentioned the term "social engineering." He or she wants to know what it is and how it might be used against the company. (Points : 10)

      
      

Question 2.2. (TCO 2) List the four ways backups are conducted and stored. (Points : 10)

      
      

Question 3.3. (TCO 2) List at least five types of disasters that can damage or destroy the information of an organization. (Points : 10)

      
      

Question 4.4. (TCO 2) What are the various ways a backup can be conducted and stored? (Points : 10)

      
      

Question 5.5. (TCO 2) Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be. Create a bulleted list of those responsibilities. (Points : 10)

      
      

Question 6.6. (TCO 3) How does PGP work? (Points : 10)

      
      

Question 7.7. (TCO 3) What is NAT and what is it used for? (Points : 10)

      
      

Question 8.8. (TCO 4) What are the laws that govern encryption and digital rights management? (Points : 10)

      
      

Question 9.9. (TCO 5) Briefly give two examples of how hoax e-mails work. (Points : 10)

      
      

Question 10.10. (TCO 6) What are the different types of removable media? (Points : 10)

      
      

Question 11.11. (TCO 6) Explain very simply how biometrics works. (Points : 10)

      
      

Question 12.12. (TCO 6) Describe the functioning of the SSL/TLS suite. (Points : 10)

      
      

Question 13.13. (TCO 6) As a network administrator, what are some of the options you have for providing secure file transfer? (Points : 10)

      
      

Question 14.14. (TCO 7) What are the differences between user, group, and role management? (Points : 10)

      
      

Question 15.15. (TCO 9) What are password and domain password policies

Explanation / Answer

1. Social Engineering:

It is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations encounter today.

2. Three ways of backups :

On-site Backup: This is a practice of keeping a backup of your data in the same location that the original data is stored. If you have an external harddrive that you backup computer onto and it stays in the office, this is a form of onsite storage.

Off-site Backup: This practice backups the data to different location than the original, i.e., remote location away from yyour business. The upside to this method is that if something happens to your physical location, your data is safe.

Online Back-up: This utilizes the internet to allow you to backup your data. The backups are kept on hosted servers and can be accessed through an application . You can quickly and easily recover your data from any location, as long as youy have access to the internet.

4. Various types of back-ups:

5. Individual user responsibilities:

6.PGP:

PGP stands for Pretty Good Privacy.

This is most often used for sending encrypted messages between people . PGP works by encrypting a messgae using public key that is tied to a specific user , when that user receives the message, they use a private key that is known only to them to decrypt it.

This system ensures that it is easy to send encrypted communication, because the only thing needed to encrypt a message is public key and the proper PGP program.

7. NAT:

NAT stands for Network Address Translation . this is designed for IP address conservation. it enables private IP networks that use unregistered IP addresses to connect to the internal NAT operates on arouter, usually containing two addresess together and translates the private address in the internal network into legal address before the packets are forwarded to another network.

NAT can be used to allow selective access to the outside of the network.

NAT is very important aspect of firewall security.

8.Laws govern the Encryption and Digital rights management:

DRM refers to the laws of technologies which provide intellectual properties ownes control over the distribution and use of their material by controlling consumersuse of it. The claimed goals are to prevent copying of digital media and to restrict access and content use to what is allowed.

Encrption laws deals with legislation ensuring that information is secure and transmitted confidentially as well as policies designed to keep secure encryption schemes out of the hand of unauthorized individuals and foreign powers.

9.

10.Removable media devices:

11. Working of bio-metrics:

Bio-metrics is a technology that identifies the persons based on their physical and behavioral traits.

Enrollment: The first time you use a bio-metric system, it records basic inforamtion about you, loke your name, identification number. It then captures an image or recording of your specific trait.

Storage: Most systems don't store the complete image. They instead analyze your trait and translate it into a code or graph and stores.

Comparision: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.

12. TLS/SSL:

TLS stands for Transport Layer Security.

SSL stands for Secure Sockets Layer.

SSL/TLS are application independent and higher-level protocols can be layered transparently on them.SSL and TLS support a variety of ciphers used to authenticate the server and client to each other, transmit certificates and establish session keys. Clients and servers may support different cipher suites, depending upon certain factors. They determine how the server and client negotiate , which cipher suites they will use to communictae. During a secure connection , the client and server agree to use the strongest cipher they have both enabled for communication.

13. FTPS is a protocol for transferring files using SSL to secure the commands and data that are being transferred between client and server. SFTP is a protocol for transferring files using SSH.

By establishing an encrypted SSL connection, public key cryptography, public and private keys , digital certifiactes, there will be a secure file transfer between client and server.

14. Differences between user, group and role management:

15. Password policies:

Domain Password Policies:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote