SEC 571 Final Exam questions and answers
1. (TCO A) List and assess at least three kinds of damage a company could suffer when
the integrity of a program or company data are compromised. (A description of
damage, not a definition of data integrity, is required.) (Points : 40)
2. (TCO B) Suppose you have a high capacity network connection coming into your
home, and you also have a wireless network access point. Also, suppose you do not
use the full capacity of your network connection. List and assess four reasons why
you might still want to prevent an outsider obtaining free network access by
intruding into your wireless network. (Points : 40)
- Exposure of your personal information such as bank account information, passwords that
are saved onto the computer and any credit card information that may be saved on the
computer.
- Potential for modification of your data. If someone hacks into your network, then they could place
viruses and other malware onto it.
- Potential flooding you your network limiting your own access. If a person gets onto your network
and uses your server that would lag on your end while being online at the same time as the person
who hacked into your system.
- Potential for illegal activities being attributed to your account. For example, if another person
hacks into your network and uses this for illegal activities, child pornographic material, stealing
others information, all of which may hold the person liable where the IP address originates.
3. 3. (TCO C) Wkh dqvzhu wr wklv txhvwlrq lv hdvb. What is the plaintext? What
cipher was used? Assess whether this would be good for today's security
programs. If not, what would be good to use and why? (Points : 40)
4. (TCO D) You have been asked to give a presentation to a law school class on digital
crime. After the presentation, a student asks why so few people are actually
prosecuted for computer crime when these crimes seem to be happening all the
time. Give a five-point outline of your response to this question. Assess the impact
on preventing crimes from your perspective given these issues. (Points : 40)
The four authentication policies are Encryption, Firewalls, Host-Based
Authentication, and Constrained User Interfaces. The four authentication policies
that cannot be controlled by technology are fingerprint, iris, voice pattern, and
face. These four are strictly based off the physical person.
Technical Controls - Computer Security Resource Center. (n.d.). Technical
Controls - Computer Security Resource Center., http://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0CD4QFjAC&url
=http%3A%2F%2Fcsrc.nist.gov%2Fgroups%2FSMA%2Ffasp%2Fdocuments
%2Fpolicy_procedure%2Ftechnical-controls-
policy.doc&ei=n41JVM72F63LsASOq4C4DQ&usg=AFQjCNEasUaSjwGdz
This study source was downloaded by 100000861168648 from CourseHero.com on 03-08-2023 05:19:00 GMT -06:00
https://www.coursehero.com/file/10735853/SEC571-Final-Exam-questions-and-answers/
1. (TCO A) List and assess at least three kinds of damage a company could suffer when
the integrity of a program or company data are compromised. (A description of
damage, not a definition of data integrity, is required.) (Points : 40)
2. (TCO B) Suppose you have a high capacity network connection coming into your
home, and you also have a wireless network access point. Also, suppose you do not
use the full capacity of your network connection. List and assess four reasons why
you might still want to prevent an outsider obtaining free network access by
intruding into your wireless network. (Points : 40)
- Exposure of your personal information such as bank account information, passwords that
are saved onto the computer and any credit card information that may be saved on the
computer.
- Potential for modification of your data. If someone hacks into your network, then they could place
viruses and other malware onto it.
- Potential flooding you your network limiting your own access. If a person gets onto your network
and uses your server that would lag on your end while being online at the same time as the person
who hacked into your system.
- Potential for illegal activities being attributed to your account. For example, if another person
hacks into your network and uses this for illegal activities, child pornographic material, stealing
others information, all of which may hold the person liable where the IP address originates.
3. 3. (TCO C) Wkh dqvzhu wr wklv txhvwlrq lv hdvb. What is the plaintext? What
cipher was used? Assess whether this would be good for today's security
programs. If not, what would be good to use and why? (Points : 40)
4. (TCO D) You have been asked to give a presentation to a law school class on digital
crime. After the presentation, a student asks why so few people are actually
prosecuted for computer crime when these crimes seem to be happening all the
time. Give a five-point outline of your response to this question. Assess the impact
on preventing crimes from your perspective given these issues. (Points : 40)
The four authentication policies are Encryption, Firewalls, Host-Based
Authentication, and Constrained User Interfaces. The four authentication policies
that cannot be controlled by technology are fingerprint, iris, voice pattern, and
face. These four are strictly based off the physical person.
Technical Controls - Computer Security Resource Center. (n.d.). Technical
Controls - Computer Security Resource Center., http://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0CD4QFjAC&url
=http%3A%2F%2Fcsrc.nist.gov%2Fgroups%2FSMA%2Ffasp%2Fdocuments
%2Fpolicy_procedure%2Ftechnical-controls-
policy.doc&ei=n41JVM72F63LsASOq4C4DQ&usg=AFQjCNEasUaSjwGdz
This study source was downloaded by 100000861168648 from CourseHero.com on 03-08-2023 05:19:00 GMT -06:00
https://www.coursehero.com/file/10735853/SEC571-Final-Exam-questions-and-answers/