{"id":53123,"date":"2024-04-26T23:33:23","date_gmt":"2024-04-26T23:33:23","guid":{"rendered":"http:\/\/localhost\/branding\/module-6-security\/"},"modified":"2024-04-26T23:33:23","modified_gmt":"2024-04-26T23:33:23","slug":"module-6-security","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/","title":{"rendered":"Module-6-Security"},"content":{"rendered":"<p>Security Module<\/p>\n<p>Schedule:<\/p>\n<p>After deadline.Ended 09\/29\/2013 11:59 PM EDT<\/p>\n<p>Started:09\/29\/2013 6:23 PM EDT<\/p>\n<p>Submitted:09\/29\/2013 6:37 PM EDT<\/p>\n<p>Score:67%<\/p>\n<p>Points:80\u00a0out of 120<\/p>\n<p>Question 1<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>An essential component of compromise to a resource is that the situation resulting in the compromise was motivated by malice.<\/p>\n<p>\u00a0True<\/p>\n<p>\u00a0False<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. A resource may be compromised by simply forgetting to logoff; it does not have to be the result of malicious hacking.<\/p>\n<p>Question 2<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>A risk is a threat that a resource, for example a computer, may be compromised.<\/p>\n<p>\u00a0True<\/p>\n<p>\u00a0False<\/p>\n<p>Feedback<\/p>\n<p>Correct. A risk is a threat that a resource may be compromised.<\/p>\n<p>Question 3<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>In the scenario below, identify which of the three dimensions is primarily threatened or compromised.<\/p>\n<p>The constant popups on his computer are making it difficult for Alfonso to accomplish work that involves being on the Internet.<\/p>\n<p>\u00a0confidentiality<\/p>\n<p>\u00a0integrity<\/p>\n<p>\u00a0availability<\/p>\n<p>Feedback<\/p>\n<p>Correct. Since Alfonso is having trouble accessing the Internet to get work done, the availability of his computer Internet connectivity has been compromised.<\/p>\n<p>Question 4<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>Jeff starts writing a report for one of his classes. Since the report is similar to a previous one he has written, he opens the previous report, makes changes, and re-saves the report, replacing the earlier version. Later he discovers that he still needs the first report. Which aspect of his resource (the first report) has been compromised?<\/p>\n<p>\u00a0Integrity<\/p>\n<p>\u00a0Availability<\/p>\n<p>\u00a0Confidentiality<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. The original report is not incorrect (which would be the case if he still had it but could not rely on its accuracy); it is simply not there because it has been overwritten with the new data.<\/p>\n<p>Question 5<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>A small company that keeps identical lists of employees in different departments runs the risk of a compromise to which aspect of that data?<\/p>\n<p>\u00a0Confidentiality<\/p>\n<p>\u00a0Availability<\/p>\n<p>\u00a0Integrity<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. There is no evidence that the data is not being kept confidential.<\/p>\n<p>Question 6<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>In the scenario below, identify which of the three dimensions is primarily threatened or compromised.<\/p>\n<p>A virus begins logging Alfonso\u2019s keystrokes and captures the user ID and password to his bank website.<\/p>\n<p>\u00a0confidentiality<\/p>\n<p>\u00a0integrity<\/p>\n<p>\u00a0availability<\/p>\n<p>Feedback<\/p>\n<p>Correct. Alfonso\u2019s user ID and password to his bank account are not secret anymore. The confidentiality of his bank account access is compromised.<\/p>\n<p>Question 7<\/p>\n<p>Points:\u00a00\u00a0out of 10<\/p>\n<p>Making data secure means keeping it secret.<\/p>\n<p>\u00a0True<\/p>\n<p>\u00a0False<\/p>\n<p>Feedback<\/p>\n<p>Incorrect. Your password needs to be secure, but that doesn\u2019t mean it\u2019s a secret. You need to know it in order to access your accounts. But only you need to know it. That is at the heart of security: those who need access to the data have it; those who do not need to have access to the data do not have access.<\/p>\n<p>Question 8<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Which type of malware is most likely to pose as a security program offering to remove a virus from your computer if you sign up and pay right away?<\/p>\n<p>\u00a0Spyware<\/p>\n<p>\u00a0A worm<\/p>\n<p>\u00a0Spam<\/p>\n<p>\u00a0A Trojan horse<\/p>\n<p>Feedback<\/p>\n<p>Correct. A Trojan horse is a program that poses as a legitimate program while actually being malware. So it might be posing as a security program.<\/p>\n<p>Question 9<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Which of the following is most likely to be spread by a USB drive?<\/p>\n<p>\u00a0A virus<\/p>\n<p>\u00a0Spam<\/p>\n<p>\u00a0A Trojan horse<\/p>\n<p>\u00a0A worm<\/p>\n<p>Feedback<\/p>\n<p>Correct. Viruses need to be transferred by other programs or files in order to infect your computer. This can be done effectively by a USB drive that can be inserted into various computers.<\/p>\n<p>Question 10<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Which of the following is MOST likely to protect you against cybercriminal attacks?<\/p>\n<p>\u00a0Having your email program remember your password<\/p>\n<p>\u00a0Sharing your password only for a good reason<\/p>\n<p>\u00a0Using an easy to remember password<\/p>\n<p>\u00a0Keeping your software and operating system up to date<\/p>\n<p>Feedback<\/p>\n<p>Correct. Keeping software and operating systems up to date will help protect you because many of the updates repair security flaws.<\/p>\n<p>Question 11<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>If a computer is compromised, popup ads&#8230;<\/p>\n<p>\u00a0increase in frequency.<\/p>\n<p>\u00a0warn you to change your password.<\/p>\n<p>Feedback<\/p>\n<p>Correct. Receiving occasional popup ads is common. However, a constant surge of popup ads may indicate that your computer is compromised.<\/p>\n<p>Question 12<\/p>\n<p>Points:\u00a010\u00a0out of 10<\/p>\n<p>Everyone needs an antivirus program, but only corporate networks need to use firewalls.<\/p>\n<p>\u00a0True<\/p>\n<p>\u00a0False<\/p>\n<p>Feedback<\/p>\n<p>Correct. While antivirus software scans your computer and files, firewall software monitors, blocks and filters activity between your computer and the Internet. You need both.<\/p>\n<p>Close<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Module Schedule: After deadline.Ended 09\/29\/2013 11:59 PM EDT Started:09\/29\/2013 6:23 PM EDT Submitted:09\/29\/2013 6:37 PM EDT Score:67% Points:80\u00a0out of<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-53123","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Module-6-Security - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Module-6-Security - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Security Module Schedule: After deadline.Ended 09\/29\/2013 11:59 PM EDT Started:09\/29\/2013 6:23 PM EDT Submitted:09\/29\/2013 6:37 PM EDT Score:67% Points:80\u00a0out of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:33:23+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/\",\"name\":\"Module-6-Security - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:33:23+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/module-6-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Module-6-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Module-6-Security - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/","og_locale":"en_US","og_type":"article","og_title":"Module-6-Security - sheilathewriter","og_description":"Security Module Schedule: After deadline.Ended 09\/29\/2013 11:59 PM EDT Started:09\/29\/2013 6:23 PM EDT Submitted:09\/29\/2013 6:37 PM EDT Score:67% Points:80\u00a0out of","og_url":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:33:23+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/","url":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/","name":"Module-6-Security - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:33:23+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/module-6-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/module-6-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Module-6-Security"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/53123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=53123"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/53123\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=53123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=53123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=53123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}