Download IT279 Unit 3 Assignments and more Assignments Computer Science in PDF only on Docsity! IT 279 UNIT 3 ASSIGNMENT 1 / Unit 3 Assignment Purdue University Global IT279 CISSP II 1. Which of the following are considered confidentiality services A. Encryption technologies B. Digital signatures C. RAID arrays “Access to data stored on secondary storage devices is one of the most critical issues facing computer security professionals. For hard disks, data can often be protected through a combination of operating system access controls. Removable media pose a greater challenge, so securing them often requires encryption technologies” (Chapple, Stewart, Gibson, 2018, p. 340). 2. Which service provided by a cryptosystem is most important for the military? A. Integrity B. Nonrepudiation C. Confidentiality “The United States (U.S.) military classification scheme is most concerned with the sensitivity of data and focuses on the protection of confidentiality (that is, the prevention of disclosure)” (Chapple, Stewart, Gibson, 2018 p. 21). 3. What is the purpose of authentication in a cryptosystem? A. Verifying the user's or system's identity B. Ensuring that data has not been changed by an unauthorized user IT 279 UNIT 3 ASSIGNMENT 2 / C. Ensuring that the data's sender cannot deny having sent the data “Authentication is the process of verifying or testing that a claimed identity is valid. Authentication requires information from the subject that must exactly correspond to the identity indicated” (Chapple, Stewart, Gibson, p. 42). 4. Which service provided by a cryptosystem turns information into unintelligible data? A. Authorization B. Integrity C. Confidentiality “First, cryptography protects the confidentiality (or secrecy) of information. Even when the transmission or storage medium has been compromised, the encrypted information is IT 279 UNIT 3 ASSIGNMENT 5 / A. Vulnerability B. Threat C. Risk “An attack is the exploitation of a vulnerability by a threat agent. In other words, an attack is any intentional attempt to exploit a vulnerability of an organization’s security infrastructure to cause damage, loss, or disclosure of assets. An attack can also be viewed as any violation or failure to adhere to an organization’s security policy” (Chapple, Stewart, Gibson, 2018, p. 66). IT 279 UNIT 3 ASSIGNMENT 6 / References Chapple, M., Stewart, J. M., Gibson, D. CISSP: Certified Information Systems Security Professional Official Study Guide. [Purdue University Global Bookshelf]. Retrieved from https://purdueuniversityglobal.vitalsource.com/#/books/9781119475873/ Miller, L. C., Gregory, P. H. CISSP For Dummies. [Purdue University Global Bookshelf]. Retrieved from https://purdueuniversityglobal.vitalsource.com/#/books/9781119210252/ IT 279 UNIT 3
REPORT CARD
Total number of Quiz taken : 3 Total number of Questions taken: 1044
Total number of Answers provided 1079 Total Unique Question Taken = abd
Please select a certification then click on the OK button:
select Certificate . Ea