Package deal
CMSC 426(Complete solutions)
CMSC 426 Midterm(Complete solutions) CMSC-426 Final Exam Review(A+ Guaranteed) CMSC-426 Exam 1(Complete solutions)
[Show more]CMSC 426 Midterm(Complete solutions) CMSC-426 Final Exam Review(A+ Guaranteed) CMSC-426 Exam 1(Complete solutions)
[Show more]access control correct answers process of granting or denying specific requests for obtaining and using information and related information processing services and to enter specific physical facilities 
 
active attack correct answers attempt to alter system resources or affect their operation 
 
ad...
Preview 2 out of 13 pages
Add to cartaccess control correct answers process of granting or denying specific requests for obtaining and using information and related information processing services and to enter specific physical facilities 
 
active attack correct answers attempt to alter system resources or affect their operation 
 
ad...
A _ is a collection of bots capable of acting in a coordinated manner correct answers botnet 
 
A(n) _ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor correct answers inline sensor 
 
The _ _ form of database attack injects code into user log...
Preview 1 out of 1 pages
Add to cartA _ is a collection of bots capable of acting in a coordinated manner correct answers botnet 
 
A(n) _ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor correct answers inline sensor 
 
The _ _ form of database attack injects code into user log...
Which of the following encryption functions has perfect secrecy? 
a) XOR cipher 
b) RC4 stream cipher 
c) 3DES block cipher 
d) One-time pad correct answers d) One-time pad 
 
Which of the following describes the security of Diffie Hellman Key Exchange? 
a) An attacker would need to factor one of Al...
Preview 2 out of 12 pages
Add to cartWhich of the following encryption functions has perfect secrecy? 
a) XOR cipher 
b) RC4 stream cipher 
c) 3DES block cipher 
d) One-time pad correct answers d) One-time pad 
 
Which of the following describes the security of Diffie Hellman Key Exchange? 
a) An attacker would need to factor one of Al...
CIANA correct answers Confidentiality 
Integrity 
Availability 
Non-repudiation 
Authentication 
 
Confidentiality correct answers Data is not available to unauthorized persons/systems 
Users have control over their information and who sees it 
 
Integrity correct answers Accuracy and completeness o...
Preview 2 out of 8 pages
Add to cartCIANA correct answers Confidentiality 
Integrity 
Availability 
Non-repudiation 
Authentication 
 
Confidentiality correct answers Data is not available to unauthorized persons/systems 
Users have control over their information and who sees it 
 
Integrity correct answers Accuracy and completeness o...
What are the three security objectives? correct answers The CIA triad 
 
What does CIA stand for? correct answers Confidentiality, Integrity, Availability 
 
What is Confidentiality in the CIA triad concerned with? correct answers data is not available to unauthorized persons/systems, users have con...
Preview 2 out of 5 pages
Add to cartWhat are the three security objectives? correct answers The CIA triad 
 
What does CIA stand for? correct answers Confidentiality, Integrity, Availability 
 
What is Confidentiality in the CIA triad concerned with? correct answers data is not available to unauthorized persons/systems, users have con...
What is the CIA triad? correct answers C- Confidentiality 
I- Integrity 
A- Availability 
 
What is confidentiality correct answers information should stay private 
 
what is integrity correct answers information should not be improperly modified or destroyed 
 
what is availability correct answers ...
Preview 2 out of 13 pages
Add to cartWhat is the CIA triad? correct answers C- Confidentiality 
I- Integrity 
A- Availability 
 
What is confidentiality correct answers information should stay private 
 
what is integrity correct answers information should not be improperly modified or destroyed 
 
what is availability correct answers ...
enterprise information security policy (EISP) correct answers The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts. 
 
What are the different management functions with respect to information security? correct ans...
Preview 2 out of 5 pages
Add to cartenterprise information security policy (EISP) correct answers The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization's security efforts. 
 
What are the different management functions with respect to information security? correct ans...
Malware stands for correct answers malicious software 
 
Malware Definition correct answers a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwis...
Preview 2 out of 10 pages
Add to cartMalware stands for correct answers malicious software 
 
Malware Definition correct answers a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwis...
black box correct answers A model for penetration testing in which management doesn't divulge to IT security personnel that testing will be conducted or give the testing team a description of the network topology 
 
Certified Information Systems Security Professional (CISSP) correct answers non ven...
Preview 1 out of 3 pages
Add to cartblack box correct answers A model for penetration testing in which management doesn't divulge to IT security personnel that testing will be conducted or give the testing team a description of the network topology 
 
Certified Information Systems Security Professional (CISSP) correct answers non ven...
Enumeration correct answers the process of extracting the following information from a network 
 
resources or shares on the network 
network topology 
Usernames or groups assigned to network 
Information about users and recent logon times 
 
Domain Controller correct answers A Windows server that ...
Preview 1 out of 3 pages
Add to cartEnumeration correct answers the process of extracting the following information from a network 
 
resources or shares on the network 
network topology 
Usernames or groups assigned to network 
Information about users and recent logon times 
 
Domain Controller correct answers A Windows server that ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller sh3rrymagdah. Stuvia facilitates payment to the seller.
No, you only buy these notes for $23.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
82871 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now