IT Security questions

  
Choose the best answer (one) and give reason in a few sentences for your choice or not choosing other. Please give a reference. To get the full credit, the reason should be in your own words, not a copy from a reference/internet source. Such a copy will be considered plagiarizing. Remember I have the same access. I may not catch every time but if I catch you may get 0 for the entire assignment. Without a reason, and/or reference as noted you will not get the full credit. Remember have your name on each page 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Q1. (4 pts) Businesses are motivated to use cryptography to protect information because 
A. information is the most difficult asset to protect 
B. information is the asset with the greatest organizational value
C. information is the easiest thing to protect
D. networks and systems are very difficult to protect adequately

Reason: –

Q2. (4 pts) Which of the following is an example of a comprehensive security strategy? ______
A. We already use encryption, so we are safe.
B. We can detect intrusions with our intrusion detection software and have a firewall. These are supplemented by our use of cryptography.
C. . We have security software and hardware, an information security officer, a security budget, employee training, and a disaster recovery system in place.

Reason: –

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Q3. (4 pts) What is the basis of the modern cryptography? _________________
A. manipulation of data
B. mathematical principles 
C. creating disguises for information 
D. none of the above

Reason: 

Q4 (4 pts) Buffer overflow can lead to___________
A. Lead to unauthorized access
B. Denial of Service
C. Trojan horses
D. -Password cracking

What are the consequences?

Q5. (4 pts) The Man in the Middle attack be thwarted by
A. By using email
B. Sending message in two parts
C. By encrypting the message
D.  By making it boring 

Reason and reference: –

Q6. (4 pts) Which of the following are properties of information?
A. It has evolved from data and is processed data.
B. It has identity.
C. It can be mathematically manipulated
D. A and B
E. A and C
F. A, B and C

No Reason required

Q7 (4 pts) The denial of service is considered as
A. Intrusion threat
B. Session hijacking threat
C. Network threat
D. Operating system threat 

Reason: –

Q8 (4 pts) Which of the following choices is not part of a suggested information security plan?  
A. protection of the information itself at the core 
B. hardening of our resources (systems and networks)
C. authentication of those accessing the information
D. Sharing strong passwords 

Reason: –

Q9 (4 pts) The best trust model for e commerce is _______
A. Public Key Certificates and Certificate Authorities
B. Kerberos
C. PGP Web of Trust
D. A, B, and C
E. None.

Reason and reference: –

Q10(4 pts) Hardening of DES cannot be accomplished by encrypting twice by two different keys: True or False

Reason:

Q11 (10 pts) (APA format, Time New Roman 12 pts type double spaced, 200-250 words) 
Compare CAIN and CIA. Could you suggest any improvement in then?

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Online Class Help Services Available from $100 to $150 Weekly We Handle Everything