SEC 571 COMPLETE COURSE
SEC571 COMPLETE COURSE
Click below link for Answers
SEC 571 Week 8 Final Exam
1. (TCO A) List and assess at least three kinds of damage a company
could suffer when the integrity of a program or company data are compromised.
(A description of damage, not a definition of data integrity, is required.)
(Points : 40)
(TCO F) Discuss four ways in
which ethics are different from laws. (Points : 40)
(TCO D) Give 3 examples of how a
person could unknowingly or unintentionally participate in a criminal act
through their computer system.
1. (TCO B) Suppose you have a
high capacity network connection coming into your home, and you also have a
wireless network access point. Also, suppose you do not use the full capacity
of your network connection. List and assess four reasons why you might still
want to prevent an outsider obtaining free network access by intruding into
your wireless network
TCO C) You are designing a
program that will be able to detect if any of the standard operating system
files on a PC have been modified. You decide to use cryptography to accomplish
this. Describe how cryptography can be used to meet your goal. (Points : 40)
(TCO E) Name four authentication
policies that can be enforced using technology and four authentication policies
that cannot be enforced using technology. Discuss the reasons why the second
four policies can't be enforced using technology and how managers could attempt
to assure compliance. (Points : 40)
(TCO H) Some IT department
policies are designed to prevent behaviors by IT staff. While some depend upon
the employee voluntarily complying with the policy (for example: do not reveal
technical information to outside parties), others are enforced technically (for
example, authentication required for system access). What is an example of a
policy that technically enforces ethical behavior by IT staff? Provide policy
wording for your example. (Points : 40)
SEC 571 COMPLETE COURSE
SEC571 COMPLETE COURSE
Click below link for Answers