Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Saint Leo University COM 520 Chapter 4 1)Which of the following is the strongest reason why operating system access controls are insufficient to secure objects? A

Saint Leo University COM 520 Chapter 4 1)Which of the following is the strongest reason why operating system access controls are insufficient to secure objects? A

Computer Science

Saint Leo University

COM 520

Chapter 4

1)Which of the following is the strongest reason why operating system access controls are insufficient to secure objects?

A.            It's possible to boot into another operating system and format the disk.

B.            Strong passwords longer that 24 characters are not common.

C.            It's possible to boot into another operating system and bypass access controls.

D.            It is often possible to find a user's password written down.

2.            What piece of information is necessary to encrypt and decrypt data?

A.            Key

B.            Salt

C.            TPM

D.            Recovery agent

3.            Which Windows feature allows you to encrypt entire volumes?

a.            EFS

b.            Truecrypt

c.             BitLocker

d.            AppLocker

4.            Which Windows feature uses keys based on a user'spassword?

a.            EFS

b.            Truecrypt

c.             BitLocker

d.            AppLocker

5.            Where does BitLocker store encryption keys for transparent mode?

a.            USB key

b.            Recovery file

c.             EFS

d.            TPM

6.            Which operating system does not have BitLocker enabled by default?

a.            Windows Server 2008

b.            Windows Vista

c.             Windows 7 Premium

d.            Windows 7 Ultimate

7.            Which of the following services does communication encryption not provide?

a.            Confidentiality

b.            Nonrepudiation

c.             Integrity

d.            Availability

8.            Which protocol commonly provides a secure channel for HTI'PS?

a.            SSL/TLS

b.            PPTP

c.             S-PPTP

D.L2TP

9.            Which VPN protocol has the fewest issues with NATs and firewalls?

 

A.            L2TP

B.            SSTP

C.            IPSec

D.            PPTP

10.          Which of the following is the weakest wireless protocol (and should never be used)?

a.            WPA

b.            PSK C.WEP

D. SSID

11.          Which type of encryption algorithm uses two related keys?

A.            Symmetric

B.            Balanced

C.            Private

D.            Asymmetric

12.          Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?

a.            Digital signature

b.            Digital certificate

c.             Certificate authority

d.            Private key

13.          What is a general approach to handling keys using trusted entities and digital certificates?

A.            PKI

B.            IPSec

C.            WPA-PSK

D.            SSTP

14.          Which common folder should be encrypted for all users?

A.            Windows

B.            Program Files

C.            My Documents

D.            My Secure Files

15.          Why is it recommended to encrypt folders instead of files?

a.            Individual files are written to disk unencrypted before being encrypted.

b.            Folder encryption is faster.

c.             Folder encryption results in less disk usage.

d.            Individual files are encrypted first then written to disk.

 

 

 

 

 

 

 

 

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE