Fill This Form To Receive Instant Help
Homework answers / question archive / Saint Leo University COM 520 Chapter 4 1)Which of the following is the strongest reason why operating system access controls are insufficient to secure objects? A
Saint Leo University
COM 520
Chapter 4
1)Which of the following is the strongest reason why operating system access controls are insufficient to secure objects?
A. It's possible to boot into another operating system and format the disk.
B. Strong passwords longer that 24 characters are not common.
C. It's possible to boot into another operating system and bypass access controls.
D. It is often possible to find a user's password written down.
2. What piece of information is necessary to encrypt and decrypt data?
A. Key
B. Salt
C. TPM
D. Recovery agent
3. Which Windows feature allows you to encrypt entire volumes?
a. EFS
b. Truecrypt
c. BitLocker
d. AppLocker
4. Which Windows feature uses keys based on a user'spassword?
a. EFS
b. Truecrypt
c. BitLocker
d. AppLocker
5. Where does BitLocker store encryption keys for transparent mode?
a. USB key
b. Recovery file
c. EFS
d. TPM
6. Which operating system does not have BitLocker enabled by default?
a. Windows Server 2008
b. Windows Vista
c. Windows 7 Premium
d. Windows 7 Ultimate
7. Which of the following services does communication encryption not provide?
a. Confidentiality
b. Nonrepudiation
c. Integrity
d. Availability
8. Which protocol commonly provides a secure channel for HTI'PS?
a. SSL/TLS
b. PPTP
c. S-PPTP
D.L2TP
9. Which VPN protocol has the fewest issues with NATs and firewalls?
A. L2TP
B. SSTP
C. IPSec
D. PPTP
10. Which of the following is the weakest wireless protocol (and should never be used)?
a. WPA
b. PSK C.WEP
D. SSID
11. Which type of encryption algorithm uses two related keys?
A. Symmetric
B. Balanced
C. Private
D. Asymmetric
12. Which of the following is used to deliver a trusted public key that can be used with assurance it belongs to the stated owner?
a. Digital signature
b. Digital certificate
c. Certificate authority
d. Private key
13. What is a general approach to handling keys using trusted entities and digital certificates?
A. PKI
B. IPSec
C. WPA-PSK
D. SSTP
14. Which common folder should be encrypted for all users?
A. Windows
B. Program Files
C. My Documents
D. My Secure Files
15. Why is it recommended to encrypt folders instead of files?
a. Individual files are written to disk unencrypted before being encrypted.
b. Folder encryption is faster.
c. Folder encryption results in less disk usage.
d. Individual files are encrypted first then written to disk.