Federal Government and security industry create an inventory of known software vulnerabilities known as __________ A) Common Vulnerabilities and Exposure B) Vulnerabilities Database C) Inventory of most know issues. 27 Vulnerability is the ______________________ in the information system that gives an opportunity to compromise the asset. A) Backend database weakness B) Weakness C) Software bug D) Hardware Vulnerability E) None 28 The vulnerability of an asset creates _________________. a) Software bug b) Hardware vulnerability c) Threats d) All 29 The Role of Information Security is to minimize the impact of ______________________ a) Hackers attack b) restriction to the system C) unavailability d) Threats e) None f) All 30 A software vulnerability is the error in : A) Specification B) Development C) Configuration D) All E)None

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

26

Federal Government and security industry create an inventory of known software vulnerabilities known as __________

 

A)      Common Vulnerabilities and Exposure B) Vulnerabilities Database C) Inventory of most know issues.

 

 

 

27

Vulnerability is the ______________________ in the information system that gives an opportunity to compromise the asset.

A)      Backend database weakness  B) Weakness  C) Software bug D) Hardware Vulnerability E) None

 

28

The vulnerability of an asset creates _________________.

a)       Software bug   b) Hardware  vulnerability   c) Threats   d) All

 

 

 

29

The Role of Information Security is to minimize the impact of ______________________

a)       Hackers attack  b) restriction to the system C) unavailability   d) Threats  e) None   f) All

 

 

30

A software vulnerability is the error in :

A)      Specification B) Development   C) Configuration D) All E)None

 

 

31

____________ is ensuring users can access objects and data they are allowed to see.

 

A) Authentication B) Authorization C) Encryption   D) None

 

 

 

 

32

Most common vulnerability in any system or application/software  is :

 

a)       SQL Injection b) Cross-Site Scripting c) Unencrypted data d) Missing Authorization   e) All

 

33

Most common threats to any system is:

a)       Viruses/Worms  B) Phishing C) DOS   D) Malware   E) All

 

34

Any retired/decommissioned hardware/server   _________________________.

A)      Need to be Auctioned D) Sale to employee   C) Give it to charity  D) Need to be disconnected from internet and shutdown E)None

 

 

35

Self-Signed Certificate is utilized for:

 

A)      A) Commerical Use B) Only in Educational Institute C) Lab testing   D) None

 

 

36

Information Security ___________________ are the safeguard to minimize the impact of information security threats.

A)      Authentication B) Controls  C) SSL Certificates D) Firewalls

 

 

37

On May 5th 2000 many receives a virus name _______________________________

A)      Stuxnet  B) James Bond Love You  C) ILOVEYOU

 

 

38

NVD stands for:

A)      National Vulnerability Database B) Native Virus Data Center  C) National Virus Database

 

39

Which one is Internet facing Server:

A)      Database Server  B) Application Server C) Web Server

 

40

Web Server define as:

a)       A server which stores sensitive data b) Computer that deliver (serves up) Web pages C) a server which is not connected to Internet (to secure data).

 

41

General Assets are assets that are found in most organization like:

a)       Online Learning System B)Email system C) Cafeteria System D) All

 

 

42

Idiosyncratic Assets are unique/distinct to any organization like:

A)      Payroll data  B) Banner/Online Learning System C) Student transcripts  D) All

 

43

Please circle correct Assets Types:

A)      Information Assets  B) Personal Assets C) Hardware Assets D) Gold & Stock Assets  E) All

 

44

In any system there are three important components for their infrastructure just like for Student Information System(SIS)

 

a)       Web, Application and Printer Server b) Application Server, Printer  Server and Database Server          C) Web, Application and Database Server   D) All

 

 

45

________________ is a form of Encryption where keys come in pairs.

 

A) Public Key   B) Asymmetric Encryption C) Symmetric encryption

 

 

46

Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network to run:

A)      Different types of Hardware and Software B) To run multiple operating systems on a single piece of hardware C) To run multiple operating systems on a multiple  pieces of hardware

 

 

47

Email System crashed due to Old Server with two internal drives, what system you will recommend?

 

A)      Repair old system and restart again (save money) B) Maintain email services locally

C ) Replace entire email system with SaaS email solution. D) Replace with Google Apps or Outlook for Education.

 

 

48

Authentication process is:

A)      Accepting the user’s credentials and allowing them to log on.

B)      Accepting the user’s credentials and allowing them to log on and review and see necessary pages.

C)      Ensuring users can access objects and data they are allowed to see.

D)      All

 

 

49

The process of converting information or data into a code, especially to prevent unauthorized access known as:

A)      Coding   B) Coding via SSL certificate  C) Encryption D) De-encryption

 

50

Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of:

 

A)    HTPPS   B) HTTP  C) SSL(Secure Socket Layer) D) None

 

 

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Threats
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education