Skip to main content

MSTM 5003 Computer And Network Security N2A Week-3

 


Week-3

 

1). What is the first step taken when validating a certificate?

A). Compare the CA that digitally signed the certificate to a list of CAs that have already been loaded into the receiver’s computer.


2). What is a certificate repository?

A). A centralized directory containing public keys and their corresponding certificates accessible by a subset of individuals

 

3). Requiring two individuals to recover a lost key together is called __________.

A). dual control


4). What is the advantage of using a centralized infrastructure for key generation?

A). It is easier to implement, back up, and recover keys.

5). If the root CA’s private key were compromised, what would happen?

A).  All entities within the hierarchical trust model would be drastically affected.

 

6). How is an outsourced CA different from a public CA?

A).  It provides dedicated services, and possibly equipment, to an individual company.

 

7). Which type of certificate authority is maintained and controlled by the company that implemented it?

A). In-house certification authority (CA)

 

8). Why should an organization construct and implement a PKI?

A). To establish a level of trust between two entities

 

9). It is important that certificates and keys are properly destroyed when their __________.

A). set lifetime expires

 

10). Which term refers to the process of restoring lost keys to the users or the company?

A).  Key recovery

 

11). In the United States, which organization is responsible for regulating products that produce electromagnetic interference?

A). Federal Communications Commission


12). What is an advantage of using a flame-activated fire detection system?

A). They can frequently detect a fire sooner than the other types of fire detection systems.

13). The best type of fire extinguisher for putting out common, combustible fires is a class C.

A). False

 

14). A person’s weight is a biological factor that can be used for authentication.

A). False

 

15). Besides physically securing access to your computers, you can do very little to prevent drive imaging.

A). True

 

16). Which fire extinguisher class is best for an electrical fire?

A). Class C


17). Which term describes an operating system distribution specifically designed to run the entire machine from an optical disc without using the hard drive?

A). Live CD

 

18). What is a drawback to water-based fire suppression systems?

A). Water-based systems are destructive to electrical equipment.

 

19). A mantrap is used to combat tailgating.

A). True

20). Which statement accurately summarizes the “security problem”?

A). Physical access negates all other security measures.

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What is the process called where missing data is fixed? a). Imputing   2. According to the instructor