Friday 16 October 2015

SE 571 Principles of Information Security

SE 571 Principles of Information Security


SE 571 Principles of Information Security and Privacy Final Exam


  1. (TCO A) You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development. List the five most desirable qualities your evaluation process should have and explain why they are important. (Be sure to address qualities of the evaluation process, not specific metrics for assessment of operating systems.) (Points : 40)

 


. (TCO B) The Open Systems Interconnection model is inherently inefficient. On the source host, each layer must take the work of higher layers, add some result, and pass the work to lower layers. On the destination host, each layer must process these results from lower layers and pass the appropriate information to upper layers. Surely this wrapping and unwrapping process is inefficient. Assess the security advantage of this layered approach. (Points : 40)


 


(TCO C) Why is a firewall usually a good place to terminate a Virtual Private Network (VPN) connection from a remote user? Why not terminate the VPN connection at the actual servers being accessed? Under what circumstances would VPN termination at the server be a good idea? (Points : 40)


 


 


(TCO D) A computer programmer has been arraigned for a computer crime. She is suspected of having accessed system files on a public Web server. The programmer’s attorney argues that his client was only trying to determine if the website was secure and that no harm was done to the Web server or its system files. The programmer’s attorney also argues that it is possible that the log files that show that his client accessed system files were tampered with. The attorney claims that the Web server was made accessible to the public anyway so that there was no violation of the law and that the arraignment against her client should be thrown out. You’re the judge. What is your analysis of these arguments? (Points : 40)


 


(TCO E) After reading about attacks on servers similar to the ones used in one of your company’s departments, the CIO has asked you to come up with a report as to what, if any, steps should be taken with your servers. List and describe the steps you would need to take in order to complete a detailed report. (Points : 40)


 


(TCO F) In the U.S., laws are enforced by police agencies and the courts. What are ethics and who enforces them? (Points : 40)


 


(TCO H) Some IT department policies are designed to prevent behaviors by IT staff. While some depend upon the employee voluntarily complying with the policy (for example: do not reveal technical information to outside parties), others are enforced technically (for example, authentication required for system access). What is an example of a policy that technically enforces ethical behavior by IT staff? Provide policy wording for your example. (Points : 40)


 


True False Questions


 


(TCO G) Which of the following statements is true? (Points : 20)


 


(1) From a legal point of view, it is easier to return software to a store because it doesn’t meet your needs than it is to do so because the software is of poor quality


 


(2) If a programmer is, i) supervised in his work, ii) subject to being fired by his employer, iii) directed in his work by his employer, and iv) under contract for the work he is doing, it is most likely true that the programmer is considered the author of the work he has produced


 


(3) A civil judge cannot find that a plaintiff has been harmed and hold a defendant liable if the defendant has violated no written law


 


(4) It is easier to prove guilt in a criminal case than it is in a civil case




Course Home Work aims to provide quality study notes and tutorials to the students of SE 571 Principles of Information Security in order to ace their studies.


Course Home Work – Best Home Work Tutorials


Home Work SE 571 Principles of Information Security

SE 571 Principles of Information Security


Course Home Work, SE 571 Principles of Information Security, Home Work Tutorials, Home Work Solutions, Home Work Essay, Home Work Questions.ACC 565 Wk 7 Assignment 3, ACC403 week 2 assignment, ACC565 Week 10, ACCT 212 (Financial Accounting),  ACCT 344 (Entire Course) – Devry, ACCT 344 Final Exam Latest 2014 – Devry,  ACCT 346 (Managerial Accounting), ACCT 346 Midterm Exam Updated DeVry, ACCT 504, ACCT 504 Week 8, ACCT 553, ART 101 Week 8, Ashford BUS 401, ASHFORD BUS 640, Ashford HIS 204, ASHFORD MAT 222 Week 3, BA 215 (Business Statistics), BA 215 All Assignments Week 1 -8 – Grantham, BA 225, BA 260, BA 265 (Business Law II), BA 265 (Business Law II) FINAL EXAM, BA 340 All Course Assignments, BA 340 Human Resource, BA 370 (Employment Law), BA 405 Multinational Management, BA 470 Week 3 – 5 – 6 – 7, BA 470 Entrepreneurship, BA350 Principles Of Finance, BIS 155 Final Exam – DeVry, BIS 220 Final Exam, BSOP 429, BSOP 434 Entire Course – Devry, BUS 303 Week 2, BUS 303 Week 3, BUS 303 Week 5, BUS 311 Business Law, BUS 330 Week 1, BUS 330 Week 3, BUS 330 Week 5, BUS 401 Week 4 DQ 1, BUS 401 Week 4 DQ 2, BUS 402 WEEK 4, BUS 405 (Principles of Investment), BUS 475, BUS 475 Final Exam 100 MCQS, BUS 475 Final Exam 600 MCQS, BUS 599 (STRAYER), BUS 599 Assignment, BUS 620 Week 4, BUS 640 Week 1, BUS499 Asignment 4, BUS508 Asignment 1, BUS499 Assignment 3.





SE 571 Principles of Information Security

No comments:

Post a Comment