Explore BrainMass

Explore BrainMass

    Information Security (6 multiple choice) questions

    Not what you're looking for? Search our solutions OR ask your own Custom question.

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    Is there anyone that can help me be better understand the 6 multiple choice questions that are attached. Please help if you can. I feel that 5 credits for these questions is a very reasonable compensation for the review.

    There are 6 multiple choice questions which I have answered. I am requesting someone with knowledge in Information Security to review and provide some explanation if your answers are different?

    © BrainMass Inc. brainmass.com March 4, 2021, 7:12 pm ad1c9bdddf


    Solution Preview

    I have tried to answer the questions and give explanations wherever required.

    1. Which best describes how malicious code can get on your computer?

    a. Email attachments

    b. Downloaded software from non-authoritative sources and websites

    c. Sharing diskettes from computers without up to date antivirus software

    d. All of the above

    e. A and C only

    My guess is "all of the above". You are correct.

    2. A way of verifying a message's integrity after transport across a network is through the use of:

    a. A Message Authentication Code

    b. Steganography

    c. An encryption key

    d. A cipher

    My Guess is an encryption key as this appears to be the safest way to transmit a message.
    You are incorrect.
    a. is the right choice.
    A Message Authentication Code is a one-way hash ...