homeworkstudyhelp

Our Services

Get 15% Discount on your First Order

Reaction in data security is: Question 1 options:   Actions which…

Reaction in data security is:

Question 1 options:

 Actions which regularly support the measures which were implemented to protect the data
 Planned measures to minimize the damage after an incident.
 

None of the listed choices are correct.

 An action taken in advance to protect the system against threats or dangers

 

 

 

 

 

 

 

 

 

 

What is Confidentiality?

Question 2 options:

 It ensures that the information is accurate, complete, reliable, and is in its original form.
 It refers to data being known or accessible to only authorized users.
 It refers to the truthfulness of the origin of data.
 It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it.

 

 

 

 

 

 

 

 

 

 

What is Authenticity?

Question 3 options:

 It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it.
 It refers to data being known or accessible to only authorized users.
 It refers to the truthfulness of the origin of data.
 It ensures that the information is accurate, complete, reliable, and is in its original form.

 

 

 

 

 

 

 

 

 

 

What is Non Repudiation?

Question 4 options:

 It refers to the truthfulness of the origin of data.
 It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it.
 It ensures that the sender and receivers of the message are accurate.
 It ensures that the information is accurate, complete, reliable, and is in its original form.

 

View hint for Question 4

Question 5 (4 points)

 

 

 

 

 

 

 

 

 

How often do we generate data?

Question 5 options:

 Only when we are working
 Continuously even when not awake.
 Only when we are working on something of value.
 Only when you save a document

 

 

 

 

 

 

 

 

 

 

What is Availability?

Question 6 options:

 It ensures that the information is accurate, complete, reliable, and is in its original form.
 It refers to data being known or accessible to only authorized users.
 It ensures that once the user captures the data in a computer system, it must make the data available to the users when they request it.
 It refers to the truthfulness of the origin of data.

 

 

 

 

 

 

 

 

 

 

Precaution for data security is:

Question 7 options:

 An action taken in advance to protect the system against threats or dangers
 Actions which regularly support the measures which were implemented to protect the data
 Planned measures to minimize the damage after an incident.
 None of the above.

 

 

 

 

 

 

 

 

 

 

Your Windows Defender detects a run time virus, what should I do?

Question 8 options:

 Ignore it.
 Forward it as an attachment to IT.
 Repair, delete, or quarantine the file.
 Save it on a USB drive for later investigation.

 

 

 

 

 

 

 

 

 

 

 

What is a Trojan?

Question 9 options:

 

They are the most commonly used type of malware. It’s a program which enters an operating system with the intention of spreading malicious code.

 This malware spies on user activity without their knowledge.
 They are a destructive program that parades itself as a harmless application
 

They are just like biological counterparts. They spread rapidly, their spreading is accelerated or mitigated by human actions and they are harmful to their host’s health

 

 

 

 

 

 

 

 

 

 

What is ransomware?

Question 10 options:

 It is malicious software designed to remotely access or control a computer without alerting the users or the security programs.
 

They are the most commonly used type of malware. It’s a program which enters an operating system with the intention of spreading malicious code.

 It is a malware which prevents users from accessing their computer systems unless a payment is made.
 This malware spies on user activity without their knowledge.

 

 

 

 

 

 

 

 

 

 

Which of the following antivirus software functions isolate files suspected of being infected with malware after detection?

Question 11 options:

 Retry
 Quarantine
 Delete
 Ignore

 

 

 

 

 

 

 

 

 

 

What is a worm?

Question 12 options:

 

They are just like biological counterparts. They spread rapidly, their spreading is accelerated or mitigated by human actions and they are harmful to their host’s health.

 This malware spies on user activity without their knowledge.
 

They are the most commonly used type of malware. It’s a program which enters an operating system with the intention of spreading malicious code.

 

They are a destructive program that parades itself as a harmless application.

 

 

 

 

 

 

 

 

 

 

What is an antivirus?

Question 13 options:

 It is a software application that detects and eradicates malware from a computer system.
 It prevents unwanted network scans.
 It blocks bulk commercial email.
 It’s 100% foolproof method to protect your device.

 

 

 

 

 

 

 

 

 

 

You accidentally open an executable attached to an email from an unknown source. Nothing seems to be wrong or happening, what should I do next?

Question 14 options:

 Delete the email and reboot the PC.
 Open and run an antivirus program on full scan.
 Forward the email to the IT administrators.
 Do nothing it should be fine.

 

 

 

 

 

 

 

 

 

 

How does a virus differ from ransomware?

Question 15 options:

 Ransom wear attacks the operating system with the intent of spreading malicious code.
 Viruses attack the operating system with the intent of spreading malicious code.
 Viruses are destructive applications for the sake of being destructive with no intent to extort money from their victims.
 Viruses are generally use encryption to extort money from the victims.

 

 

 

 

 

 

 

 

You turn on your PC and notice that your Windows operating system is running slowly and your third party antivirus is not running. What should you do?

Question 16 options:

 Purchase and install a different third party antivirus.
 Reboot your PC.
 Format the HD and start over.
 Turn on Windows Defender and run a full scan.

 

 

 

 

 

 

 

 

 

 

How does a worm and Trojan horse differ?

Question 17 options:

 Worms generally attack the user’s data, encrypting them for ransom.
 Trojan horses are commonly hide themselves as useful/harmless applications.
 Worms generally hide themselves as a useful/harmless application.
 Trojan horses disrupt normal operations by flooding the network with traffic.

 

 

 

 

 

 

 

 

 

 

Even though the terms data and information are often used interchangeably, there is a distinction between them. What is that distinction?

Question 18 options:

 

7 character difference.

 Information is processed data which conveys a specific meaning and is of substantial value.
 

Data is processed information.

 Data can be stolen while information cannot.

 

 

 

 

 

 

 

 

 

 

Which of the following is true about organizational data?

Question 19 options:

 Protecting data owned by commercial entities are the sole responsibility of the company.
 Organizational data are often subject to intentional theft by market competitors.
 Personal and organizational data are always stored separately.
 Organizational data is always on company owned PC’s and phones.

 

 

 

 

 

 

 

 

 

 

Data belonging to commercial entities, if leaked, can wreak havoc on them. Which of the following are implications of a data breach?

Question 20 options:

 

All displayed answers are correct.

 

Loss of intellectual property.

 

Loss of productivity.

 

Loss of reputation.

 

 

 

 

 

 

 

 

One of the last Padgett Beale campgrounds that used a telephone reservation and cash only process has decided to accept credit cards through the use of a portable credit card reader service (e.g. Square) through a smart phone. What are the risks to the campground?

Question 21 options:

 Malware/Spyware may steal customer information
 Loss of credit card reader
 The loss of the phone will result in theft of customer information.
 Loss of cell phone connection

 

 

 

 

 

 

 

 

 

 

Padgett Beale’s General Manager for Robenia’s Guest House has notified staff members that a group of foreign dignitaries will be staying at the property for a nearby conference. She has asked that the names, titles, and rooms of the guests be protected for operational security reasons. Which information security function should PBI’s IT department focus on?

Question 22 options:

 Availability.
 Integrity
 Continuity
 Confidentiality

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Define the acronyms SLE, ARO and ALE. Based on the readings…

Define the acronyms SLE, ARO and ALE. Based on the readings identify and include a formula (after the definitions) which uses the acronyms to calculate a quantitative risk. Once a risk assessment has been completed, concisely list in bullet point format the five actions you can use to reduce the risk.

Word processing software is the most common type of application…

Word processing software is the most common type of application used on a computer. Those of you with prior computer experience will most likely have used some type of word processing program. What does word processing mean to you? The following points will be covered: using a computer to create,

In 50-100 words, please explain in your own words how symmetric and…

In 50-100 words, please explain in your own words how symmetric and asymmetric encryption works. In 50-100 words, please explain in your own words how SSL, TLS, HTTPS work and can be utilized to defend communications. In 50-100 words, please explain PKI and what this capability provides and organization.  

Complete the Percipio Course (18 minutes) Keeping Your Skill Set…

Complete the Percipio Course (18 minutes) Keeping Your Skill Set Current in the Digital Economy. Links to an external site.Attach the .png of your digital badge to this discussion and answer the following questions. By Noon (Central) on Thursday, November 17 answer at least one of the questions; given the

Figure 4-64 shows a web page containing text from a Shakespearean…

Figure 4-64 shows a web page containing text from a Shakespearean sonnet. In this Coding Challenge, you will augment the text of the poem with background colors and images and add a graphic border.   Open the code4-1_back.css file and style rule for the figure element that: Set the padding

The “S3” in Amazon S3 stands for: Question 1 options:   Storage…

The “S3” in Amazon S3 stands for: Question 1 options:   Storage Security Service   Stateful Storage Server   Simple Storage Service   Software Systems Security   Question 2 (1 point) ( multichoice)   Select the AWS S3 Storage Classes from the following list Question 2 options:   Amazon S3

1. What is a theme that “Harrison Bergeron” and 2081 share, and how…

1. What is a theme that “Harrison Bergeron” and 2081 share, and how is Vonnegut’s approach to the theme different from that of the film? 2. Vonnegut’s “Harrison Bergeron” and 2081 present different versions of their main character’s age, appearance, and final speech. What other differences do you notice between

QUESTION 1 UDP has which of the following characteristics:      …

QUESTION 1 UDP has which of the following characteristics:       three-way hand shake for connection establishment     connection state at the server     regulated send rate     none of the above 10 points    QUESTION 2 The stop-and-wait protocol is highly inefficient when    

Question 1 Which of the following are benefits of the Domain Name…

Question 1 Which of the following are benefits of the Domain Name System (DNS)? Select all that apply.   1 point It provides addresses that are easier for people to remember.   It assigns Internet Protocol (IP) addresses.   It provides Network Address Translation (NAT).   It helps automate network

Book: The Great Gatsby The two car accidents – (p. 57-59)…

Book: The Great Gatsby The two car accidents – (p. 57-59) (p.144-48.) Each example at least one paragraph a) Summarize the general similarities between the two scenes (less detail); b) Contrast the mirrored scenes (list the differences). Focus on characters, actions, atmosphere. (more information needed for the contrasts as it

If you plan to pursue networking or security as your area of…

If you plan to pursue networking or security as your area of specialty in IT, you might consider ea  Complete the following steps to create your account: 1.       Go to netacad.com/courses/packet-tracer. If the course is not listed on this page, do a search for packet tracer site:netacad.com and follow links

Part 3: Assign IP Addresses on the PCs (12 pts)   Assign IP…

Part 3: Assign IP Addresses on the PCs (12 pts)   Assign IP addresses to the PCs in the 192.168.1.0/27 network using the following requirements:Assign PC0 the THIRD usable addressAssign PC1 the FOURTH usable addressAssign PC2 the SECOND to LAST usable addressAssign PC3 the LAST usable addressAssign the appropriate default