I need help with these 2 questions...they are \"partially\" correct...something
ID: 3924271 • Letter: I
Question
I need help with these 2 questions...they are "partially" correct...something is wrong with both of them:
The following are among the well-known and accepted security concepts. Choose only the answers that are correct.
Obfuscation, which is effective because it means things are hidden
Confidentiality, Integrity, Availability
Rainbow tables used to generate random user passwords
Logging, Monitoring, Auditing
Non-repudiation via Digital Signature
Access Control
Graphical User Interface
(I chose 1,2,4,5,6) This was partially wrong, so something is right about it, but something is wrong as well.
Which of the following devices can be used in a network to provide for security. Choose All of the correct ones from this list.
Packet filtering routers with Access Control Lists (ACLs) that are reviewed monthly or any time there is a notification from reliable sources of a new method for attacking network-level infrastructure.
High performance automated email scanning devices used to input data directly into accounts payable records.
Virtual Private Network (VPN) devices based on well-known protocols such as SSL version 3 or TLS.
Large Level 2 Cache Memory so that CPU performance is enhanced.
Intrusion Detection System (IDS)
Subscription to vulnerability information services and other security news services so that administrators may stay informed about important information.
Software developed by former employees where the source code is not under any maintenance contract, but for which there is no ongoing support costs because budget concerns would not allow for either a replacement or maintenance. The software has never failed in anyone's memory.
(I chose 1,3,5). This was partially wrong, so something is right about it, but something is wrong as well
Obfuscation, which is effective because it means things are hidden
Confidentiality, Integrity, Availability
Explanation / Answer
Answer for 1st question would be 2, 5, and 6. I will explain why 1, and 4 are not the answer.
1 - Obfuscation - It is just data hiding or confusing user by using various jargaon. There is no algorithmic way to encode and secure data.
4 - Logging, Monitoring, and Auditing - There is no way to secure your data using these three methods. These are just used for maintenance purpose of software.
Answer for 2nd question would be 1, and 3.
5 - IDS is just a way of detecting any attacks, it does not solve the problem of preventing attacks.