Devry Sec 280 Final Exam – Latest

Submitted by: Submitted by

Views: 10

Words: 3985

Pages: 16

Category: Other Topics

Date Submitted: 05/01/2016 09:44 PM

Report This Essay

DeVry SEC 280 Final Exam – Latest

http://www.spinwoop.com/?download=devry-sec-280-final-exam-latest

For Further Information And For A+ Work Contact US At SPINWOOP@GMAIL.COM

SEC 280 Final Exam DeVry – 2015

Question : (TCO 2) What are the security risks of installing games on an organization’s system?

Student Answer: There are no significant risks.

Users can’t always be sure where the software came from and it may have hidden software inside of it.

The users may play during work hours instead of during breaks.

The games may take up too much memory on the computer and slow down processing, making it difficult to work.

Instructor Explanation: page 75

Points Received: 4 of 4

Comments:

Question 2. Question : (TCO 2) All of the following are techniques used by a social engineer EXCEPT for which one?

Student Answer: An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number.

An attacker calls up the IT department posing as an employee and requests a password reset.

An attacker runs a brute-force attack on a password.

An attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information.

Instructor Explanation: page 68

Points Received: 4 of 4

Comments:

Question 3. Question : (TCO 2) Attackers need a certain amount of information before launching their attack. One common place to find information is to go through the trash of the target to find information that could be useful to the attacker. This process of going through a target’s trash is known in the community as _____

Student Answer: trash rummaging

garbage surfing

piggy diving

dumpster diving

Instructor Explanation: page 74

Points Received: 4 of 4

Comments:

Question 4. Question : (TCO 2) What are the SSL and TLS used for?

Student Answer: A means of securing...