One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you’ll have to identify related research, read the papers, and assimilate prior work into your research. An annotated bibliography helps you develop and hone these research skills. The paper must be in a correct APA format, use correct grammar, and will need to include at least five (5) resources, ALL of which must: 1) Be current. Published within the last few years. 2) Be peer-reviewed
April 27, 2020What are the preconditions for conducting constructive dialogue in an organization?FILLER TEXT2. Is effective risk management possible without constructive dialogue?FILLER TEXT3. What are the forces that tend to undermine effective risk management in an organization?
April 27, 2020Question Description
n
nnMultiple Choice questions, (2 points each)nn1.Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key?nnA. Key clusteringnnB. Key compressionnnC. Key signingnnD. Key exchangenn2. When an employee transfers within an organization …nnA. The employee must undergo a new security review.nnB. The old system IDs must be disabled.nnC. All access permission should be reviewed.nnD. The employee must turn in all access devices.nn3. Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?nnA. Discretionary Access ControlnnB. Task-initiated Access ControlnnC. Subject-dependent Access ControlnnD. Token-oriented Access Controlnn4. As an information systems security manager (ISSM), how would you explain the purpose for a system security policy?nnA. A definition of the particular settings that have been determined to provide optimum securitynnB. A brief, high-level statement defining what is and is not permitted during the operation of the systemnnC. A definition of those items that must be excluded on the systemnnD. A listing of tools and applications that will be used to protect the systemnn5. Configuration management provides assurance that changes…?nnA. to application software cannot bypass system security features.nnB. do not adversely affect implementation of the security policy.nnC. to the operating system are always subjected to independent validation and verification.nnD. in technical documentation maintain an accurate description of the Trusted Computer Base.nn6. What type of cryptanalytic attack where an adversary has the least amount of information to work with?nnA. Known-plaintextnnB. Ciphertext-onlynnC. Plaintext-onlynnD. Chosen-ciphertextnn7. Prior to installation of an intrusion prevention system (IPS), a network engineer would place a packet sniffer on the network, what is the purpose for using a packet sniffer?nnA. It tracks network connections.nnB. It monitors network traffic.nnC. It scans network segments for cabling faults.nnD. It detects illegal packets on the network.nn8. What determines the assignment of data classifications in a mandatory access control (MAC) philosophy?nnA. The analysis of the users in conjunction with the audit departmentnnB. The assessment by the information security departmentnnC. The user’s evaluation of a particular information elementnnD. The organization’s published security policy for data classificationnn9. An access control system that grants users only those rights necessary for them to perform their work is operating on which security principle?nnA. Discretionary AccessnnB. Least PrivilegennC. Mandatory AccessnnD. Separation of Dutiesnn10. Which of the following is the primary goal of a security awareness program?nnA. It provides a vehicle for communicating security procedures.nnB. It provides a clear understanding of potential risk and exposure.nnC. It provides a forum for disclosing exposure and risk analysis.nnD. It provides a forum to communicate user responsibilities.nn11. An information security program should include the following elements:nnA. Disaster recovery and business continuity planning, and definition of access control requirements and human resources policies.nnB. Business impact, threat and vulnerability analysis, delivery of an information security awareness program, and physical security of key installations.nnC. Security policy implementation, assignment of roles and responsibilities, and information asset classification.nnD. Senior management organizational structure, message distribution standards, and procedures for the operation of security management systems.nn12. Which of the following refers to a series of characters used to verify a user’s identity?nnA. Token serial numbernnB. User IDnnC. PasswordnnD. Security ticketnn13. Security of an automated information system is most effective and economical if the system is…?nnA. optimized prior to addition of security.nnB. customized to meet the specific security threat.nnC. subjected to intense security testing.nnD. designed originally to meet the information protection needs.nn14. Act of obtaining information of a higher level of sensitivity by combining information from lower level of sensitivity is called?nnA. AggregationnnB. Data miningnnC. InferencennD. Polyinstantiationnn15. Which of the following is the least important information to record when logging a security violation?nnA. User’s namennB. User id.nnC. Type of violationnnD. Date and time of the violationnn16. The goal of cryptanalysis is to…?nnA. forge coded signals that will be accepted as authentic.nnB. ensure that the key has no repeating segments.nnC. reduce the system overhead for cryptographic functions.nnD. determine the number of encryption permutations required.nn17. Pretty Good Privacy (PGP) provides…?nnA. confidentiality, integrity, and authenticity.nnB. integrity, availability, and authentication.nnC. availability, authentication, and non-repudiation.nnD. authorization, non-repudiation, and confidentiality.nn18. Which of the following transaction processing properties ensures once a transaction completes successfully (commits), the updates survive even if there is a system failure?nnA. Atomicity.nnB. Consistency.nnC. Isolation.nnD. Durability.nn19. A security policy provides a way to…?nnA. establish a cost model for security activities.nnB. allow management to define system recovery requirements.nnC. identify and clarify security goals and objectives.nnD. enable management to define system access rules.nn20. Computer security is generally considered to be the responsibility of…?nnA. everyone in the organization.nnB. corporate management.nnC. the corporate security staff.nnD. everyone with computer access.nn21. What is a set of step-by-step instructions used to satisfy control requirements called?nnA. PolicynnB. StandardnnC. GuidelinennD. Procedurenn22. The accounting branch of a large organization requires an application to process expense vouchers. Each voucher must be input by one of many accounting clerks, verified by the clerk’s applicable supervisor, then reconciled by an auditor before the reimbursement check is produced. Which access control technique should be built into the application to best serve these requirements?nnA. Mandatory Access Control (MAC)nnB. Password SecuritynnC. Role-based Access Control (RBAC)nnD. Terminal Access Controller Access System (TACACS)nn23. When verifying key control objectives of a system design, the security specialist should ensure that the…?nnA. final system design has security administrator approval.nnB. auditing procedures have been defined.nnC. vulnerability assessment has been completed.nnD. impact assessment has been approved.nn24. Which of the followings are security concerns with distributed systems?nnA. Downloaded data from the Internet via the web or through e-mail may infect other computers.nnB. Desktop systems may not be properly secured.nnC. Unauthorized access to a secured network could be made through remote control or terminal server programs running on a desktop.nnD. A, B, and C.nn25. Three principal schemes that provide a framework for managing access control are:nnA. Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role Based Access Control (RBAC).nnB. Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Layer Based Access Protocol (LBAP).nnC. Mandatory Access Control (MAC), Layer Based Access Protocol (LBAP), and Target Based Access Protocol (TBAP).nnD. Role Based Access Control (RBAC), Layer Based Access Protocol (LBAP), and Target Based Access Protocol (TBAP).nnEssay Questions (10 points each)n
- n
- Each device on a network actually has two network-related addresses: MAC address and IP address. Describe each of these addresses and what is ARP positioning attack.
- Describe what is SNMP (Simple Network Management Protocol)?
- What is Reconnaissance attack?And What is port scanning? How it can be prevented?
- What is DOS denial-of-service and DDOS distributed denial-of-service?
- Describe how do we secure public servers? Describe how do we secure Server Farms?
n
n
n
n
n
n