01 Nov Which of the following is considered the first lin
Which of the following is considered the first line of defense against human behavior? Explain.Please answer the following questions in a word docThank youa)Which of the following is considered the first line of defense against human behavior? Explain.A) PoliciesB) CryptographyC) Physical securityD) Business continuity planningb) Select from the following the best definition of security risk analysis:A) Risk analysis looks at the probability that a vulnerability exists in your system.B) Risk analysis looks at the probability that your security measures won’t stop a hacker breaking in to your system.C) Risk analysis looks at the probability that a hacker may break in to your system.D) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them.E) Risk analysis looks at the consequences of being connected to the Internet.c) Which answer governs how a network might be configured and operated as well as how people are expected to behave on it? Explain.A) Network documentationB) RegulationsC) ProceduresD) Policiesd) Which answer is one that contains actions to be taken in a certain situation like how long before users must change passwords, actions to take if an infiltration takes place or a users steals corporate date? Explain.A) PoliciesB) DocumentationC) RegulationsD) ProceduresPROBLEM 2 Networking Fundamentals (20 points)(5 pts each)a) While using which type of networking device would each host see’ all other traffic on the network?A) Network SwitchB) Network RouterC) Network HubD) Token Ring Networkb) Which type of network device divides broadcast domains? Explain.A) SwitchesB) HubsC) RoutersD) Bridgesc) What destination MAC Address would be added to a packet on the route to a remote computer? Explain.A) MAC Address of the far side of the default gatewayB) MAC Address of your computerC) Exterior MAC Address of the remote ServerD) Interior MAC address of default gatewayd) You have two network segments separated by a router. A host on one segment does an ARP request for a certain IP Address. Would that request cross the router? Explain.A) Yes, because routers forward broadcastsB) Yes, if there is a hub between segmentsC) Only if you have a Caching EngineD) No, routers do not forward broadcastsPROBLEM 3 Cryptography Fundamentals (20 points)(5 pts each)a) Users in your organization sign their emails with digital signatures. What provides integrity for these certificates? Explain.A) HashingB) EncryptionC) Non-repudiationD) Private keyb) Bob wants to send a secure email to Alice so he decides to encrypt it. Bob wants to ensure that Alice can verify that he sent it. Which of the following does Alice need to verify the certificate that Bob used in this process is valid? Explain.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Do you need help with this question?
Get assignment help from Aqhomework.com Paper Writing Website and forget about your problems.
Aqhomework provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Click Order now to access our order form, fill your paper details correctly, select your paper deadline and wait for our writers to send a perfectly written assignment.
Chat with us today! We are always waiting to answer all your questions.