Submitted by: Submitted by ambermalik
Views: 10
Words: 3985
Pages: 16
Category: Other Topics
Date Submitted: 05/01/2016 09:44 PM
DeVry SEC 280 Final Exam – Latest
http://www.spinwoop.com/?download=devry-sec-280-final-exam-latest
For Further Information And For A+ Work Contact US At SPINWOOP@GMAIL.COM
SEC 280 Final Exam DeVry – 2015
Question : (TCO 2) What are the security risks of installing games on an organization’s system?
Student Answer: There are no significant risks.
Users can’t always be sure where the software came from and it may have hidden software inside of it.
The users may play during work hours instead of during breaks.
The games may take up too much memory on the computer and slow down processing, making it difficult to work.
Instructor Explanation: page 75
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 2) All of the following are techniques used by a social engineer EXCEPT for which one?
Student Answer: An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.
An attacker calls up the IT department posing as an employee and requests a password reset.
An attacker runs a brute-force attack on a password.
An attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information.
Instructor Explanation: page 68
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 2) Attackers need a certain amount of information before launching their attack. One common place to find information is to go through the trash of the target to find information that could be useful to the attacker. This process of going through a target’s trash is known in the community as _____
Student Answer: trash rummaging
garbage surfing
piggy diving
dumpster diving
Instructor Explanation: page 74
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 2) What are the SSL and TLS used for?
Student Answer: A means of securing...