ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers
6 keer bekeken 0 keer verkocht
Vak
ESOC 477
Instelling
ESOC 477
ESOC 477 FINAL REVIEW UPDATED
Exam Questions and CORRECT Answers
began to examine the feasibility of redundant networked communications - Correct AnswerAdvanced Research Projects Agency (ARPA)
Developed the ARPANET (a network project that preceded the Internet) from its inception -
Correct Ans...
ESOC 477 FINAL REVIEW UPDATED
Exam Questions and CORRECT Answers
began to examine the feasibility of redundant networked communications - Correct Answer-
Advanced Research Projects Agency (ARPA)
Developed the ARPANET (a network project that preceded the Internet) from its inception -
Correct Answer- Dr. Larry Roberts
What happened in 1968? - Correct Answer- Maurice Wilkes discusses password security in
Time - Sharing Computer Systems
What happened in 1970? - Correct Answer- Willis H. Ware authors the report Security
Controls for Computer Systems: Report of Defense Science Board Task Force on Computer
Security—RAND R.609 which was not declassified until 1979. It became known as the
seminal work identifying the need for computer Security
What happened in 1973? - Correct Answer- Schell, Downey, and Popek examine the need for
additional security in military systems in Preliminary Notes on the Design of Secure Military
Computer Systems
What happened in 1975? - Correct Answer- The Federal Information Processing Standards
(FIPS) examines DES (Digital Encryption Standard) In the Federal Register
What happened in 1978? - Correct Answer- Bisbey and Hollingsworth publish their study
"Protection Analysis: Final Report," which discussed the Protection Analysis project created
by ARPA to better understand the vulnerabilities of operating system security and examine
the possibility of automated vulnerability detection techniques in existing system software
When it is the subject of an attack? - Correct Answer- the computer is used as an active tool
to conduct attack
When it is the object of an attack - Correct Answer- the computer is the entity being attacked
, A computer can be? - Correct Answer- First be object, then - subject
senior management, responsible for the security and use of a particular set of information -
Correct Answer- Data owners
responsible for the information and systems that process, transmit, and store it. (IS/IT
practitioners) - Correct Answer- Data custodians
individuals, also with some information security role - Correct Answer- Data users
Information security performs four important functions for an organization: - Correct
Answer- -Protecting the organization's ability to function
-Protecting the data and information the organization collects and uses
-Enabling the safe operation of applications running on the organization's IT systems
-Safeguarding the organization's technology assets
can erode consumer confidence, diminishing organization's sales, net worth, and reputation -
Correct Answer- Web site defacing
a much more sinister form of hacking: the premeditated, politically motivated attacks against
information, computer systems, computer programs, and data that result in violence against
noncombatant targets by the state-sponsored/(sub)national groups or clandestine agents -
Correct Answer- Cyberterrorism/Cyberwarfare
It includes the execution of viruses, worms, Trojan horses, and active Web scripts with the
intent to destroy or steal information - Correct Answer- Malware (malicious code)
It consists of code segments that attach to existing program and take control of access to the
targeted computer - Correct Answer- Virus
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper MGRADES. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €9,27. Je zit daarna nergens aan vast.