Module 3 Quiz

1.Which type of certificate authority is maintained and controlled by the company that implemented it?In-house certification authority (CA) 2.A digital certificate binds an individual’s identity to a public key.True 3.A public key infrastructure __________.provides all of the components needed for…

IS5803 WEEK 1 SOLUTIONS

1.Most firms give their IT budgets a low priority in good economic times. A.False 2. The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation. A. False 3. Of the…

Module 2 Quiz

1What step can be taken to evaluate the effectiveness of the security measures in place at an organization?Perform a vulnerability assessment. 2.Which term describes a legal agreement between partners establishing the terms, conditions, and expectations of the relationship between the…

Module 1 Quiz

1.Into which threat category does information warfare fall?Highly structured 2.How did the Code Red worm spread?It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month. 3.How long did it take for…