Chat with us, powered by LiveChat Saint COm520 module 8 quiz 4 | Writedemy

Saint COm520 module 8 quiz 4

Saint COm520 module 8 quiz 4

Question

Grade Details – All Questions

Question 1. Question : What is the best response to any security incident?

Student Answer: Contact your local law enforcement agency.

Alert management.

Follow the predefined plan.

Isolate damaged equipment first.

Points Received: 0 of 1

Comments:

Question 2. Question : Why should you never encrypt individual files?

Student Answer: Encrypting files may leave unencrypted versions on disk

Encrypting a file makes it less secure

Encrypting individual files allows attackers to decrypt by comparing files

Encrypting individual files is very slow

Points Received: 0 of 1

Comments:

Question 3. Question : Which term refers to the SDLC’s most important concept that means to break down a software project into phases?

Student Answer: Decomposition

Progressive elaboration

Iterative detailing

Crashing

Points Received: 1 of 1

Comments:

Question 4. Question : Which incident handling step determines the type and possibly the source of an incident?

Student Answer: Containment

Eradication

Recovery

Identification

Points Received: 1 of 1

Comments:

Question 5. Question : When should investigators preserve the chain of custody during an investigation?

Student Answer: When investigating incidents that may result in court proceedings

When investigating incidents that will absolutely result in court proceedings

When investigating all incidents

Only when directed by a law enforcement officer

Points Received: 1 of 1

Comments:

Question 6. Question : Most of the time a CSIRT spends in responding to incidents is spent in which step?

Student Answer: Preparation

Containment

Eradication

Recovery

Points Received: 1 of 1

Comments:

Question 7. Question : Which type of plan protects an organization from critical function interruptions?

Student Answer: DRP

BCP

Recovery plan

Project plan

Points Received: 1 of 1

Comments:

Question 8. Question : What is recommended for implementing secure authentication in Windows?

Student Answer: NTLM

RADIUS

Kerberos

OpenLDAP

Points Received: 1 of 1

Comments:

Question 9. Question : What is the most common location to place a firewall?

Student Answer: Inside the internal network

Outside the internal network

DMZ

WAN

Points Received: 1 of 1

Comments:

Question 10. Question : Which software project scope provides the greatest visibility?

Student Answer: A separate project for each major module in a software application

A single project to develop a complete application

A separate project for each individual program

A single project for a group of related programs

Points Received: 0 of 1

Comments:

Question 11. Question : Many application errors in today’s applications come from problems with database definitions. What are the formal data declarations that database management systems use?

Student Answer: Schemas

Variables

Storage units

Data diagrams

Points Received: 1 of 1

Comments:

Question 12. Question : Why is writing a password down an unsafe practice?

Student Answer: A written password is easier to forget

Users often make mistakes when writing complex passwords

Written passwords are easier for attackers to find

Writing a password down reduces the need to memorize it

Points Received: 1 of 1

Comments:

Question 13. Question : At what point in a software development project should security be included?

Student Answer: At the start of the analysis phase

From the beginning

Code generation

Testing

Points Received: 1 of 1

Comments:

Question 14. Question : Which of the following software tools would an investigator use to acquire evidence from a hard disk

drive?

Student Answer: AIRT

SIFT

RTIR

MBSA

Points Received: 0 of 1

Comments:

Question 15. Question : When does an SDLC phase end?

Student Answer: When the team accepts the deliverables for that phase

At the appointed ending data

When the Configuration Control Board officially closes the phase

When work starts on the subsequent phase

Points Received: 1 of 1

Comments:

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order