Saint com510 chapter 1,3,4,5,9,10 module quiz and midterm exam latest


  

Chapter 1

Question 1

When solving problems, what is the first step?

Develop possible solutions

Recognize and define the problem

Analyze and compare the possible solutions

Select, implement and evaluate a solution

Question 2

The C.I.A. triad for computer security includes which of these characteristics?

availability

authorization

accountability

authentication

Question 3

A malware programs that hides its true nature, and reveals its designed behavior only when activated is called a(n) ____________.

Trojan horse

Virus

Spam

Worm

Question 4

An act where people enter real or virtual premises or systems they have not been authorized to enter is called ____________.

security

theft

trespass

bypass

Question 5

What function will an audit log provide when it is configured to track user activity on an information system?

authorization

identification

authentication

accountability



assignmenthelpglobal.com