Is there anyone that can help me be better understand the 6 multiple choice questions that are attached. Please help if you can. I feel that 5 credits for these questions is a very reasonable compensation for the review.© BrainMass Inc. brainmass.com September 22, 2018, 6:46 pm ad1c9bdddf - https://brainmass.com/computer-science/data-clustering/information-security-6-multiple-choice-questions-87743
I have tried to answer the questions and give explanations wherever required.
1. Which best describes how malicious code can get on your computer?
a. Email attachments
b. Downloaded software from non-authoritative sources and websites
c. Sharing diskettes from computers without up to date antivirus software
d. All of the above
e. A and C only
My guess is "all of the above". You are correct.
2. A way of verifying a message's integrity after transport across a network is through the use of:
a. A Message Authentication Code
c. An encryption key
d. A cipher
My Guess is an encryption key as this appears to be the safest way to transmit a message.
You are incorrect.
a. is the right choice.
A Message Authentication Code is a one-way hash ...