Week 8 FE SEC 571 Week 8 Final Exam Answers Click Link Below To Buy: http://hwcampus.com/shop/sec-571-week-8-final-exam-answers/ 1. (TCO A) You are

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Week 8 FE SEC 571 Week 8 Final Exam Answers

Click Link Below To Buy:


1. (TCO A) You are responsible for developing a security evaluation process that can be used to

assess various operating systems both during and after development. List the five most desirable
qualities your evaluation process should have and explain why they are important. (Be sure to address
qualities of the evaluation process, not specific metrics for assessment of operating systems.) (Points :

2. (TCO B) The Open Systems Interconnection model is inherently inefficient. On the source host,
each layer must take the work of higher layers, add some result, and pass the work to lower layers. On
the destination host, each layer must process these results from lower layers and pass the appropriate
information to upper layers. Surely this wrapping and unwrapping process is inefficient. Assess the
security advantage of this layered approach. (Points : 40)

3. (TCO C) Why is a firewall usually a good place to terminate a Virtual Private Network (VPN)
connection from a remote user? Why not terminate the VPN connection at the actual servers being
accessed? Under what circumstances would VPN termination at the server be a good idea? (Points : 40)

4. (TCO D) A computer programmer has been arraigned for a computer crime. She is suspected of
having accessed system files on a public Web server. The programmer’s attorney argues that his client
was only trying to determine if the website was secure and that no harm was done to the Web server or
its system files. The programmer’s attorney also argues that it is possible that the log files that show that
his client accessed system files were tampered with. The attorney claims that the Web server was made
accessible to the public anyway so that there was no violation of the law and that the arraignment against
her client should be thrown out. You’re the judge. What is your analysis of these arguments? (Points : 40)

5. (TCO E) After reading about attacks on servers similar to the ones used in one of your company’s
departments, the CIO has asked you to come up with a report as to what, if any, steps should be taken
with your servers. List and describe the steps you would need to take in order to complete a detailed
report. (Points : 40)

6. (TCO F) In the U.S., laws are enforced by police agencies and the courts. What are ethics and
who enforces them? (Points : 40)

7. (TCO G) Which of the following statements is true? (Points : 20)
8. (TCO H) Some IT department policies are designed to prevent behaviors by IT staff. While some

depend upon the employee voluntarily complying with the policy (for example: do not reveal technical
information to outside parties), others are enforced technically (for example, authentication required for
system access). What is an example of a policy that technically enforces ethical behavior by IT staff?
Provide policy wording for your example. (Points : 40)

This study source was downloaded by 100000752667788 from CourseHero.com on 12-12-2021 16:28:58 GMT -06:00

Powered by TCPDF (www.tcpdf.org)



Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality