Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

CHAPTER 2 Security Considerations for Small Businesses 51 CHAPTER 2 ASSESSMENT D

ID: 3885528 • Letter: C

Question

CHAPTER 2 Security Considerations for Small Businesses 51 CHAPTER 2 ASSESSMENT Denial-of-service (DoS) attacks stop access to authorized users of a Web site. A. True 6. Many security features are available for building a secure system. Which of the following describe categories of security features? (Select three.) A. Authentication B. Auditing C. Confidentiality D. Encryption B. False 2. Which of the following are included in CLM? Select three.) A. Acquisition B. Retention C. Suspension D. Conversion 7. The most important single thing an organization can do to defend itself against network attacks and malware is to keep systems patched and updated A. True B. False 3. Which of the following are required to establish a VPN connection? (Select three.) A. VPN client B. VPN server C. SSL D. Transmission media 8. "Contact us" forms are an example of which of the following? A. One-way communication B. Full two-way communication C. Limited two-way communication D. Full one-way communication 4. You are designing a customer-service strategy for a large company. The client has asked that you incorporate full two-way communication between service staff and the customer. Which of the following methods would you suggest? Select two.) A. E-mail support B. FAQ C. Customer feedback forms D. VolP 9. You have to connect three remote employees to the corporate network. Which of the following technologies would you use? A. SSL B. VPN C. One-way communication D. Remote acquisition 5. Despite the overwhelming trend of companies 10. Which protocol is used by HITPS for encrypting data between the client and the host? A. SSL B. SSH C. RSH D. TFTP g an online presence, some companies do not see an adequate return on investment from a Web site: or their Web site generates very little interest. Which of these following characteristics might not be a factor for poor performance by a Web site? A. Poor visitor tracking B. 7/24/365 availability C. Poor site design D. Confusing checkout procedures

Explanation / Answer

Please find below the anwsers

1. A

Denial-of-service attack will affect also

the authorized users from acessing the website.

2. A,B,D

3. A,B,D

4. A,D

In email support customer can as query and it is 24*7 availiable

coustomer feed back form also handy for getting true queries.

5. B

7/24/365 always help to generate

great return on investement and mostly website nowdays have this convention

6. A,B,D

7. A

Many organiaztions installing the antivirus for acting against the

attacks as first prevention.

8. C

Contact us il limited two communication

as coustomer used to ask query and team gonna answer that

and it is limited because only limited query can be asked

9. B

VPN or virtual private network will be best option

for secretly connect remote employess to its own corporate network

by doing this employess will never know the actual IP and location.

10. A

Secure Sockets Layer or SSL used by HTTPS protocol for

encryting the data

Please do let me know if u have any concern.... will helping you ASAP..