CramX Logo
INFA610: Final Exam - Information Security and Intellectual Property - Document preview page 1

INFA610: Final Exam - Information Security and Intellectual Property - Page 1

Document preview content for INFA610: Final Exam - Information Security and Intellectual Property

INFA610: Final Exam - Information Security and Intellectual Property

A similar exam on information security and intellectual property for INFA610, covering topics in data protection and legal considerations.

Daniel Mitchell
Contributor
5.0
0
12 months ago
Preview (3 of 8 Pages)
100%
Log in to unlock
Page 1 of 3
INFA610: Final Exam - Information Security and Intellectual Property - Page 1 preview imagePage1of8INFA610: Final Exam-Information Security and Intellectual PropertyFINALINFA610Name_________________________Date____________________InstructionsYou are to take this final examduring thetwelfthweek of the class. This final exam will be postedbefore noon, Sunday, April 19, 2015 andis dueon or beforenoon, Sunday, April 26, 2015.Work alone. You may not confer with other class members, or anyone else, directly or by e-mailor otherwise, regarding the questions, issues or your answers. You may use your notes, textbooks,other published materials,the LEOsite for this class, and the Internet.Wherever possible, make sure answers are stated in your own words, and where applicableprovide your own examples, rather than repeating the ones used in the course materials. Whencomposing your answers,be thorough. The more complete your answer, the higher your scorewill be. Be sure to identify any assumptions you are making in developing your answers. Whilecomposing your descriptive answers, beverycareful to cite your sources. It is easy to getcareless and forget to footnote a source. Remember, failure to cite sources constitutes anacademic integrity violation. Use APA style for citations and references.This finalis worth 25% of your final grade for the course. It is scored on the basis of 100 points.Please provide your answers immediately below the questions.(Do not submit answersalone in a separate sheet.)Please submit your work using the Final Exam assignment folder.No late submission for the final exam.Exam QuestionsPart 1: True (T) or False (F).IMPORTANT: If you answer False (F),then you MUST say WHY it is in afew wordsto receive full credit.(5 questions at 2point each, 10 points in all)EXAMPLE QUESTIONS ONLYT FYour Professor’s last name is Douglas.Answer: ___F___ (it is Kelly)T FThis course is INFO610.Answer: ___T___1.T FDeep packet inspection firewalls protect networks by blocking packets based on thepackets’ header information at the network (IP) layer.Answer: __False___IfF, why?Employers have the right (and in some cases the obligation) to see any information
Page 2 of 3
INFA610: Final Exam - Information Security and Intellectual Property - Page 2 preview image
Page 3 of 3
INFA610: Final Exam - Information Security and Intellectual Property - Page 3 preview imagePage2of8stored, transmitted, or communicated within the employer's environment. This legal right is thebasis for monitoring (or at least explicitly stating the right to monitor) email, network traffic,voice, wireless, and other communications.Answer: _True____2.T FIntrusion Detection Systems (IDS) provide no protection from internal threats.Answer:false it analysis both external and internal threat and reports to the administration for furtheraction.3.T FA Denial-of-Service attack does not require the attacker to penetrate the target'ssecurity defenses.Answer: _false an attacker can send multiple request to the serveforauthenticationinthese case if you want to block the user from gaining access to your network youcan use a sniffer to detect a certain address that needs to authorization whichoriginates from the same address from a certain address and block the attacker4.T FSecurity awareness, training, and education programs are key components oforganizational risk management strategies.Answer: ___True__Part 2: Multiple Choice Questions. Print the correct answer in the blank following the question.(22questions at 2 points each, 40 pointsplus 4 bonus pointsin all)1.Match the followingTCP/IP protocol layer with its function (selecta.,b.,c., ord.below):A.Network1. Coordinatescommunication between applications.B. Physical2. Supportsuseful functions over the transport layer such identity/location of applications.C.Application3. Movesinformation between hosts that are not directly connected.D. Transport4. Movesbits between the nodes in the network.a.A--->3; B--->4; C--->2; D--->1b.A--->2; B--->4; C--->1; D--->4c.A--->2; B--->3; C--->4; D--->1d.A--->3; B--->4; C--->1; D--->2Answer: _____________2.Protection of a software program that uses a unique, novel algorithm could legally be protected by:a.A patentb.A copyrightc.A trademarkd.Ethical standardsAnswer: _A____3.Securitythreatsinclude which of the following:a.Unlocked doorsb.Disgruntled employees
Preview Mode

This document has 8 pages. Sign in to access the full document!