Concept explainers
Hi there,
Please answer all the five multiple choice questions. No written explanation needed for all the questions. Thank you in advance.
A. Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network. Which of the following BEST describes these results?
A. True negatives B. True positives
C. False positives D. False negatives
[2] Which of the allow Pete, a security analyst, to trigger a security alert reduce the risk of employees working in collusion to embezzle funds from their company?
A. Privacy Policy B. Least Privilege
C. Acceptable Use D. Mandatory Vacations
[3] Two members of the finance department have access to sensitive information. The company is concerned they may work together to steal information. Which of the following controls could be implemented to discover if they are working together?
A. Least privilege access B. Separation of duties
C. Mandatory access control D. Mandatory vacations
[4] One of the system administrators at a company is assigned to maintain a secure computer lab. The administrator has rights to configure machines, install software, and perform user account maintenance. However, the administrator cannot add new computers to the domain, because that requires authorization from the Information Assurance Officer. This is an example of which of the following?
A. Mandatory access B. Rule-based access control
C. Least privilege D. Job rotation
[5] A security administrator notices that a specific network administrator is making unauthorized changes to the firewall every Saturday morning. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall?
A. Mandatory vacation B. Job rotation
C. Least privilege D. Time of day restrictions
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- 8. The value of HLEN in an IP datagram is 7. How many option bytes are present?arrow_forwardWhich IP datagram fields constantly change in this sequence of ICMP messages delivered by your computer? Which fields don't change? Which field should be constant? Which fields need updating? Why?arrow_forwardWhich Zigbee data fields are encrypted when both confidentiality and message integrity are provided? Are certain data field(s) authenticated? The message integrity code is created either before to or after to encoding.arrow_forward
- Identify the IP datagram fields that are unique to each of your machines in the ICMP messages they send. The fields are stable, eh? Is there a constant among these? Which fields do you need changed? Why?arrow_forwardAssume a computer is sending the following 3 bytes of data: 89 241 72 over UDP. The data is being sent from port 59700 to port 443 What is the checksum that should be included with the packet? Your answer should be 16 bits long. Make sure you include both the packet header and the payload in the checksum calculation. Show your work.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education