Download CRM596 Quiz 1 - Chapters 1-3

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Malware wikipedia , lookup

Security-focused operating system wikipedia , lookup

PaX wikipedia , lookup

Transcript
____________________________________
REGIS UNIVERSITY
College for Professional Studies
3333 Regis Blvd.
Denver, CO 80221
____________________________________
MSIA 676 – Spring 2011 (SP8W2)
Securing and Protecting Systems, Applications, and Data
Instructor – Dr. Jesús Borrego
EXAM 1
Answer the following 5 questions. Prepare a document with a title page formatted per APA
format. If you use external sources, make sure to cite your work. Submit your document to
the Assignment Drop Box. The exam is due by midnight Sunday of Week 4.
QUESTIONS
1. An operating system requires no protection for its executable code in memory because that
code is a duplicate of code maintained on disk. Do you agree or disagree? Explain your
answer.
2. Explain how an AntiVirus program works to detect infected files.
3. A common rule in systems with multiple classifications is not to allow a higher classification
process to write to a lower classification area. Is this a good or bad idea? Explain.
4. Inference is a problem for databases. Explain why it is so, and how you would attempt to
prevent the problem from happening.
5. What is a honeypot and what does it have to do with computer security?