Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

5. True of False Software can both be patented and copyrighted.

5. True of False
Software can both be patented and copyrighted. One problem with the copyrighting software is that the code must be published. If the code is published, someone can re-implement the algorithm or the technique embodied in the code.

Answer: TRUE

6. Data can be labeled at several levels, which of these levels is not correct:

a. At the field level

b. At the access level

c. At the record level

d. At the file level

Answer: B

7. True or False

At a high level, database security boils down to answering four questions: Who is it? (Authentication), Who can do it? (Authorization), Who can see it? (Encryption), Who did it? (Audit)

Answer: True

8. All modern operating systems implement access control. What kind of access control does an Android smartphone or Iphone have right out of the box?

a. MAC

b. DAC

c. RBAC

d. ABAC

Answer: C

9. Advanced malware typically comes via distribution channels. All of these are potential distribution channels except:

a. Drive-by download

b. Unsolicited email

c. Social media

d. Self propagation

e. Physical media

Answer: D

10. You try to log into your free personal email account, but you are asked to change your password for security purposes, they also send a text message to your cellphone with a number to enter on the website for verification purposes. What kind of authentication process is this?

a. Password reset authentication

b. Identity protection identification

c. Multi-Factor authentication

d. Fingerprint access authentication

Answer: C

11. True or False

You are the security/software engineer at XYZ company, you are tasked to write some code to encrypt messages. You don’t want to use the usual encryption algorithms, so you use Diffie-Hellman algorithm which is a great algorithm that is directly used to encrypt messages. Is this true or false?

Answer: TRUE

12. Continuing from question 17 above. You are also tasked with encrypting all website traffic in other words going from HTTP to HTTPS. What will be needed in terms of securing the website. Choose one of the following:

a. Digital Certificate

b. ACL list

c. Multi-Factor authentication

d. Biometrics

Answer: A

13. Continuing from question 17 above. You are also tasked with some of the database work for the company. Which one of the following key types is used to enforce referential integrity between database tables?

a. Session key

b. Foreign key

c. Primary key

d. Public key

Answer: B

14. Continuing from question 17 above. You have a Top Secret clearance, but you are briefed into a “Secret” project because you have a need to know in order to access the data. What model is used in this example.

a. BIBA

b. Bell-La-Padula

c. Clark Wilson

d. SABSA

Answer: D

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"