1.(TCO 2) Give an example of a hoax and how it might actually be destructive. (Points : 10)…

1.(TCO 2) Give an example of a hoax and how it might actually be destructive. (Points : 10)
2.(TCO 2) List the four ways backups are conducted and stored. (Points : 10)
3.(TCO 2) Name at least four high-level policies an organization needs to consider. (Points : 10)

1.(TCO 2) Give an example of a hoax and how it might actually be destructive. (Points : 10)
2.(TCO 2) List the four ways backups are conducted and stored. (Points : 10)
3.(TCO 2) Name at least four high-level policies an organization needs to consider. (Points : 10)
4.(TCO 2) Describe the various components of a business continuity plan. (Points : 10)
5.(TCO 2) Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be. Create a bulleted list of those responsibilities. (Points : 10)
6.(TCO 3) List and describe three types of network topologies. (Points : 10)
7.(TCO 3) What is the difference between TCP and UDP? (Points : 10)
8.(TCO 4) What are the laws that govern computer access and trespass? (Points : 10)
9.(TCO 5) Describe the laws that govern digital signatures. (Points : 10)
10.(TCO 6) What are the four common methods for connecting equipment at the physical layer? (Points : 10)
11.(TCO 6) What is multiple-factor authentication? (Points : 10)
12.(TCO 6) Why is the following statement true?

“Physical access negates all other security measures.” (Points : 10)
13.(TCO 6) What are some of the security issues associated with web applications and plug-ins? (Points : 10)
14.(TCO 7) What are some security issues related to web-based applications? (Points : 10)
15.(TCO 9) What are the different methods of access management (MAC, DAC, RBAC)? (Points : 10)