Se-571 Principles of Information Security and Privacy Final Exam

3182 Words Jul 9th, 2015 13 Pages
SE-571 Principles of Information Security and Privacy Final Exam
Follow Link Below To Get Tutorial
https://homeworklance.com/downloads/se-571-principles-information-security-privacy-final-exam/
Description:

1. (TCO A) You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development. List the five most desirable qualities your evaluation process should have and explain why they are important. (Be sure to address qualities of the evaluation process, not specific metrics for assessment of operating systems.) (Points : 40)

. (TCO B) The Open Systems Interconnection model is inherently inefficient. On the source host, each layer must take the work
…show more content…
You’re the judge. What is your analysis of these arguments? (Points : 40)

(TCO E) After reading about attacks on servers similar to the ones used in one of your company’s departments, the CIO has asked you to come up with a report as to what, if any, steps should be taken with your servers. List and describe the steps you would need to take in order to complete a detailed report. (Points : 40)

(TCO F) In the U.S., laws are enforced by police agencies and the courts. What are ethics and who enforces them? (Points : 40)

(TCO H) Some IT department policies are designed to prevent behaviors by IT staff. While some depend upon the employee voluntarily complying with the policy (for example: do not reveal technical information to outside parties), others are enforced technically (for example, authentication required for system access). What is an example of a policy that technically enforces ethical behavior by IT staff? Provide policy wording for your example. (Points : 40)

True False Questions

(TCO G) Which of the following statements is true? (Points : 20)

(1) From a legal point of view, it is easier to return software to a store because it doesn’t meet your needs than it is to do so because the software is of poor quality

(2) If a programmer is, i) supervised in his work, ii) subject to being fired by his employer, iii) directed in his work by his employer, and iv) under contract for the work he is doing, it…

Related Documents