ANSWERS ALL CORRECT
Which of the following statements are true about high-level formatting? Select all that
apply.
c) Presents the system with an empty file system
b) Establishes addressable tracks and sectors on the hard drive
a) Establishes the file system on the hard drive
e) Constructs an empty root-level file directory
d) Rewrites all sector headers and check values - Answer- C, D, E
The Fourth Amendment prevents arbitrary searches of areas where users expect their
privacy to be protected. This is referred to as:
d) search and seizure.
a) reasonable expectation of privacy.
b) admissibility.
c) consent to search. - Answer- reasonable expectation of privacy
Chapter 4 discussed several U.S. federal laws and industry standards that may induce
a site to keep event logs. The laws require federal agencies and certain industries to
keep records, but don't really apply to other enterprises. However, it is customary in
some industries to implement other security mechanisms, like passwords. If an
enterprise fails to take reasonable and customary steps, it may be found at fault if
others suffer losses due to their poor security. What concept does this illustrate?
c) Civil law
b) Legislative obligation
a) Due diligence
d) Remediation - Answer- due diligence
Kevin is accused by a local company of unauthorized access to a company computer.
The company reported it to the local police, and Kevin has been charged with criminal
computer access under a state law. Which of the following are true about this legal
process? Select all that apply.
c) May require a third party to resolve the issue, like a mediator, judge, and/or jury
d) May be resolved informally between the perpetrator and victim, or their legal
representatives
a) Based on a shared relationship, like employer and employee.
b) Requires evidence admissible in court
, e) The perpetrator is charged with breaking a law. - Answer- c) May require a third party
to resolve the issue, like a mediator, judge, and/or jury
b) Requires evidence admissible in court
e) The perpetrator is charged with breaking a law.
True or False? All attacks cause damage to a system. - Answer- false
True or False? Biometrics and tokens are a good choice for a household environment. -
Answer- false
True or False? Entropy refers to the strength of a password system. - Answer- false
True or False? Biometrics are a favored form of authentication, as they are immune to
sniffing attacks. - Answer- false
True or False? When the fault tolerance goes up, so do the false positives. - Answer-
true
The Enigma was:
d) a U.S. encryption standard.
b) a type of ciphertext.
c) a rotor machine.
a) an algorithm. - Answer- rotor
An algorithm is a type of:
c) readable data.
b) security principle.
a) procedure.
d) unreadable data. - Answer- procedure
The video stored on DVDs is encrypted. Where do we get the key to decrypt the DVD
when we play it?
c) The key is stored in the player.
a) The key is included in DVD software that we download from the internet.
d) The key is stored on the DVD itself.
b) The key is included in the DVD's package and we enter it separately when we play
the video. - Answer- c) The key is stored in the player.
True or False? An encryption application program, from a user's point of view, protects
a file with a memorized password. - Answer- true
AES was introduced in what year?
a) 2002
b) 1989
c) 2007
d) 1975 - Answer- 2002