Incident Threats Week 2

.docx

School

Grand Rapids Community College *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by ConstableWildcatMaster401

Report
Congratulations! You passed! Grade received 100% Latest Submission Grade 100% To pass 80% or higher Go to next item 1. Question 1 Which mobile operating system was originally based on the Linux kernel? 1 / 1 point iOS Android Blackberry Windows Correct Correct! 2. Question 2 Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2) 1 / 1 point Android Correct Partially correct! Blackberry Windows iOS Correct Partially correct! 3. Question 3 True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system. 1 / 1 point True False Correct Correct! 4. Question 4 What is one limitation to the operation of anti-virus software running on mobile devices? 1 / 1 point Antivirus software is very effective on mobile devices because it can inspect the data that is associated with each app but only while the app is not running. Antivirus software can "see" the apps that are running on a mobile device but cannot see the data that is associated with each app. Antivirus software must be granted permission to inspect each app on a device. Mobile devices provide native security that makes additional anti-virus software unnecessary. Correct Correct! 5. Question 5
On a mobile device, which type of threat is a phishing scam? 1 / 1 point App based System based Internal External Correct Correct! 6. Question 6 A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad? 1 / 1 point Availability Integrity Authorization Confidentiality Correct Correct! 7. Question 7 A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action? 1 / 1 point Confidentiality Availability Authorization Integrity Correct Correct! 8. Question 8 A student can see her grades via her school's Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad? 1 / 1 point Authorization Integrity Availability Confidentiality Correct Correct! 9. Question 9 True or False. An operator who corrupts data by mistake is considered an "inadvertent attack" that should be considered when developing data protection plans. 1 / 1 point True False Correct Correct! 10.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help