Info Assurance & Security Tutorial 1

1
TIA2221 Information Assurance and Security Tutorial 1 1. Explain why someone wants to hack your computer? Describe what kind of information that can be derived from the hack ? 2. Describe how we could protect our data and minimize damage from hacking for Windows based system? 3. Describe different categories of hackers trading in black market? 4. Why is necessary integrate information assurance and security policies and regulation? 5. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notary B. Certification authority C. Key distribution center D. Key revocation certificate 6.A timely review of system access records would be an example of which basic security function? A. Avoidance B. Deterrence C. Prevention D. Detection

description

Question only

Transcript of Info Assurance & Security Tutorial 1

Page 1: Info Assurance & Security Tutorial 1

TIA2221 Information Assurance and Security Tutorial 1

1. Explain why someone wants to hack your computer? Describe what kind of information that can be derived from the hack ?

2. Describe how we could protect our data and minimize damage from hacking for Windows based system?

3. Describe different categories of hackers trading in black market?

4. Why is necessary integrate information assurance and security policies and regulation?

5. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notaryB. Certification authorityC. Key distribution center D. Key revocation certificate

6.A timely review of system access records would be an example of which basic security function? A. Avoidance B. Deterrence C. Prevention D. Detection