CramX Logo
INFA610: Final Exam - Information Security and Intellectual Property - Document preview page 1

INFA610: Final Exam - Information Security and Intellectual Property - Page 1

Document preview content for INFA610: Final Exam - Information Security and Intellectual Property

INFA610: Final Exam - Information Security and Intellectual Property

A final exam on information security and intellectual property, testing knowledge on safeguarding data and protecting intellectual assets.

Daniel Mitchell
Contributor
4.8
0
12 months ago
Preview (4 of 10 Pages)
100%
Log in to unlock
Page 1 of 4
INFA610: Final Exam - Information Security and Intellectual Property - Page 1 preview imageINFA610: Final Exam-Information Security and Intellectual PropertyFINALINFA610Name: _______Date_04/19/2015InstructionsYou are to take this final exam during the twelfth week of the class. This final exam will be postedbefore noon, Sunday, April 19, 2015 and is dueon or before noon, Sunday, April 26, 2015.Work alone. You may not confer with other classmembers, or anyone else, directly or by e-mailor otherwise, regarding the questions, issues or your answers. You may use your notes, textbooks,other published materials, the LEO site for this class, and the Internet.Wherever possible, make sure answers are stated in your own words, and where applicableprovide your own examples, rather than repeating the ones used in the course materials. Whencomposing your answers,be thorough. The more complete your answer, the higher your scorewill be. Be sure to identify any assumptions you are making in developing your answers. Whilecomposing your descriptive answers, beverycareful to cite your sources. It is easy to getcareless and forget to footnote a source. Remember, failure to cite sources constitutes anacademic integrity violation. Use APA style for citations and references.This final is worth 25% of your final grade for the course. It is scored on the basis of 100 points.Please provide your answers immediately below the questions.(Do not submit answersalone in a separate sheet.)Please submit your work using the Final Exam assignment folder.No late submission for the final exam.Exam QuestionsPart 1: True (T) or False (F). IMPORTANT: If you answer False (F), then you MUST say WHY it is in afew words to receive full credit.(5 questions at 2point each, 10 points in all)EXAMPLE QUESTIONS ONLYT FYour Professor’s last name is Douglas.Answer: ___F___ (it is Kelly)T FThis course is INFO610.Answer: ___T___1.T FDeep packet inspection firewalls protect networks by blocking packets based on thepackets’ header information at the network (IP) layer.Answer: _false____IfF, why? This is anadvanced type of data filtering that works at the application layer.Employers have the
Page 2 of 4
INFA610: Final Exam - Information Security and Intellectual Property - Page 2 preview image
Page 3 of 4
INFA610: Final Exam - Information Security and Intellectual Property - Page 3 preview imageright (and in some cases the obligation) to see any information stored, transmitted, orcommunicated within the employer's environment. This legal right is the basis for monitoring (orat least explicitly stating the right to monitor) email, network traffic, voice, wireless, and othercommunications.Answer: _True____2.T FIntrusion Detection Systems (IDS) provide no protection from internal threats.Answer:__false it analysis both external and internal threat and reports to the administration forfurther action.___3.T FA Denial-of-Service attack does not require the attacker to penetrate the target'ssecurity defenses.Answer: _false an attacker can send multiple request to the serveforauthenticationin these case if you want to block the user from gaining accessto your network you can use a sniffer to detect a certain address that needs toauthorization which originates from the same address from a certain addressand block the attacker____4.T FSecurity awareness, training, and education programs are key components oforganizational risk management strategies.Answer: true_____Part 2: Multiple Choice Questions. Print the correct answer in the blank following the question.(22questions at 2 points each, 40 points plus 4 bonus points in all)1.Match the following TCP/IP protocol layer with its function (selecta.,b.,c., ord.below):A.Network1. Coordinates communication between applications.B. Physical2. Supports useful functions over the transport layer such identity/location of applications.C. Application3. Moves information between hosts that are not directly connected.D. Transport4. Moves bits between the nodes in the network.a.A--->3; B--->4; C--->2; D--->1b.A--->2; B--->4; C--->1; D--->4c.A--->2; B--->3; C--->4; D--->1d.A--->3; B--->4; C--->1; D--->2Answer: ___A2.Protection of a software program that uses a unique, novel algorithm could legally be protected by:a.Apatentb.A copyrightc.A trademarkd.Ethical standardsAnswer: _E____3.Securitythreatsinclude which of the following:a.Unlocked doors
Page 4 of 4
INFA610: Final Exam - Information Security and Intellectual Property - Page 4 preview imageb.Disgruntled employeesc.Hurricanesd.Un-patched software programse.All of the aboveAnswer: E___4.Denial of service attacksinclude (select one or more):a.Buffer overflow attackb.Smurf attackc.Ping flood attackd.SYN flood attacke.All of the aboveAnswer: _E:____5.A disgruntled employee creates a utility for purging old emails from the server. Inside the utility iscode that that will erase the server’s hard drive contents on January 1st, 2016. This is an example ofwhich of the following attacks?a.Virusb.Logic Bombc.Spoofingd.Trojan horsee.Botnetf.Rootkitg.BackdoorAnswer: G____6.Mary is the cofounder of Acme Widgets, amanufacturing firm. Together with her partner, Joe, shehas developed a special oil that will dramatically improve the widget manufacturing process. Maryand Joe plan to make large quantities of the oil by themselves in the plant after the other workershave left to keep the formula secret. They would like to protect this formula for as long as possible.What type of intellectual property protection best suits their needs?a.Copyrightb.Trademarkc.Patentd.Trade SecretAnswer: D_______7.You should clear cookies in your browser periodically because:a.They (Cookies) can be used to track your web browsing behavior and invade your privacy.b.They can facilitate impersonation attacks.c.They can be used to spread viruses.
Preview Mode

This document has 10 pages. Sign in to access the full document!