Information Security (6 multiple choice) questions
Not what you're looking for?
Is there anyone that can help me be better understand the 6 multiple choice questions that are attached. Please help if you can. I feel that 5 credits for these questions is a very reasonable compensation for the review.
There are 6 multiple choice questions which I have answered. I am requesting someone with knowledge in Information Security to review and provide some explanation if your answers are different?
Purchase this Solution
Solution Preview
I have tried to answer the questions and give explanations wherever required.
1. Which best describes how malicious code can get on your computer?
a. Email attachments
b. Downloaded software from non-authoritative sources and websites
c. Sharing diskettes from computers without up to date antivirus software
d. All of the above
e. A and C only
My guess is "all of the above". You are correct.
2. A way of verifying a message's integrity after transport across a network is through the use of:
a. A Message Authentication Code
b. Steganography
c. An encryption key
d. A cipher
My Guess is an encryption key as this appears to be the safest way to transmit a message.
You are incorrect.
a. is the right choice.
A Message Authentication Code is a one-way hash ...
Purchase this Solution
Free BrainMass Quizzes
Basic Computer Terms
We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.
C# variables and classes
This quiz contains questions about C# classes and variables.
Excel Introductory Quiz
This quiz tests your knowledge of basics of MS-Excel.
C++ Operators
This quiz tests a student's knowledge about C++ operators.
Word 2010: Table of Contents
Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.