Test 5

Test 5 - View Attempt...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Title: 5 Started: July 5, 2010 5:42 PM Submitted: July 5, 2010 6:23 PM Time spent: 00:41:07 Total score: 82/100 = 82% Total score adjusted by 0.0 Maximum possible score: 100 1. 07-073 Identify the four basic principles that contribute to systems reliability according to the Trust Services framework developed by the AICPA and the CICA. Student Response: 1. Developing and documenting policies 2. Effectively communicating policies to all authorized users 3. Designing and employing appropriate control procedures to implement policies 4. Monitoring the system and taking corrective action to maintain compliance with policies Sample Correct Answer Security, confidentiality, privacy, processing integrity, availability. General Feedback: Security, confidentiality, privacy, processing integrity, availability. Score: 8/8 Comments: 2. 07-075 What are three ways users can be authenticated? Student Response: 1. Something they know, such as passwords or personal identification numbers (PINs) 2. Something they have, such as smart cards or ID badges 3. Some physical characteristic (referred to as a biometric identifier), such as their fingerprints or voice Sample Correct Answer Users can be authenticated by verifying: 1. something they know (password). 2. something they have (smart card or ID badge). 3. Something they are (biometric identification of fingerprint). General Feedback: Users can be authenticated by verifying: 1. something they know (password). 2. something they have (smart card or ID badge). 3. Something they are (biometric identification of fingerprint). Score: 8/8 Comments: 3. 07-077 How does an intrusion detection system work? Student Response: They create logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions. Sample Correct Answer An intrusion detection system creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions. General Feedback: An intrusion detection system creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions. View Attempt http://webctap.gardner-webb.edu/webct/urw/lc8932375. .. 1 of 10 7/28/2010 9:51 AM
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Score: 8/8 Comments: 4. 07-079 Describe four requirements of effective passwords Student Response: 1. Length - longer is better, should be at least 8 characters 2. Multiple character types - kept a secret to be effective 4. Random - should not be related to personal interests or hobbies Sample Correct Answer 1. Strong passwords should be at least 8 characters. 2. Passwords should use a mixture of upper and lowercase letters, numbers and characters. 3. Passwords should be random and not words found in dictionaries. 4. Passwords should be changes frequently. General
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/27/2011 for the course ACC 400 taught by Professor Null during the Summer '10 term at GWU.

Page1 / 10

Test 5 - View Attempt...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online