SEC 571 Final Exam questions and answers 2022. 1. (TCO A) List and assess at least three kinds of damage a company could suffer when
the integrity of a program or company data are compromised. (A description of damage, not a
definition of data integrity, is required.) (Points : 40)
2. (TCO B) Su...
1. (TCO A) List and assess at least three kinds of damage a company could suffer when
the integrity of a program or company data are compromised. (A description of damage, not a
definition of data integrity, is required.) (Points : 40)
2. (TCO B) Suppose you have a high capacity network connection coming into your home, and you
also have a wireless network access point. Also, suppose you do not use the full capacity of your
network connection. List and assess four reasons why you might still want to prevent an outsider
obtaining free network access by intruding into your wireless network. (Points : 40)
Exposure of your personal information such as bank account information, passwords that are
saved onto the computer and any credit card information that may be saved on the computer.
Potential for modification of your data. If someone hacks into your network, then they could place
viruses and other malware onto it.
Potential flooding you your network limiting your own access. If a person gets onto your network
and uses your server that would lag on your end while being online at the same time as the person
who hacked into your system.
Potential for illegal activities being attributed to your account. For example, if another person
hacks into your network and uses this for illegal activities, child pornographic material, stealing
others information, all of which may hold the person liable where the IP address originates.
3. 3. (TCO C) Wkh dqvzhu wr wklv txhvwlrq lv hdvb. What is the plaintext? What cipher was
used? Assess whether this would be good for today's security programs. If not, what would be
good to use and why? (Points : 40)
4. (TCO D) You have been asked to give a presentation to a law school class on digital crime. After
the presentation, a student asks why so few people are actually prosecuted for computer crime
when these crimes seem to be happening all the time. Give a five-point outline of your response
to this question. Assess the impact on preventing crimes from your perspective given these
issues. (Points : 40)
The four authentication policies are Encryption, Firewalls, Host-Based
Authentication, and Constrained User Interfaces. The four authentication policies
that cannot be controlled by technology are fingerprint, iris, voice pattern, and
face. These four are strictly based off the physical person.
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller DoctorReinhad. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R52,10. You're not tied to anything after your purchase.