Course Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group? A.Zombie B.Hacker network C.Crime syndicate D.Botnet

D

What is the best way to avoid getting spyware on a machine? A.Install the latest operating system updates B.Install software only from trusted websites C.Install the latest antivirus updates D.Install the latest web browser updates

B

Which of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states? A.Application layer firewall B.Transport layer firewall C.Host-based firewall D.Network address translation firewall E.Network layer firewall

B

After a data breach, it's important to educate employees, partners and customers on how to prevent future breaches.' Is this statement true or false? True False

True

An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee's behavior ethical or unethical? Ethical Unethical

Unethical

What vulnerability occurs when data is written beyond the memory areas allocated to an application? A.Race conditions B.Non-validated input C.Buffer overflow D.Access control problems E.Weaknesses in security practices

C

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan? A.Integrity B.Confidentiality C.Scalability D.Availability

D

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability? A.Buffer overflow B.Weaknesses in security practices C.Race conditions D.Access control problems E.Non-validated input

D

Which of the following certifications is aimed at high school and early college students, as well as anyone interested in a career change? A.EC Council Certified Ethical Hacker B.ISACA CSX Cybersecurity Fundamentals C.ISC2 Certified Information Systems Security Professional D.Palo Alto Networks Certified Cybersecurity Associate E.Microsoft Technology Associate Security Fundamentals F.CompTIA Security+

E

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration? A.Availability B.Confidentiality C.Integrity D.Scalability

B

Which of the following security implementations use biometrics? Choose two correct answers A.Fob B.Voice recognition C.Phone D.Fingerprint E.Credit card

B & D

Which of the following are categories of security measures or controls? Choose three correct answers A. Camera B.Policy and procedure C.Guards D.Technology E.Firewalls F.Awareness, training and education

B, C, F

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website? A.VPN service B.Password manager C.Open authorization D.In-private browsing mode

C

Which of the following are commonly used port scanning applications? Select two correct answers A.Sequence number B.Port number C.Zenmap D.Nmap

C & D

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee's behavior ethical or unethical? Ethical Unethical

Ethical


संबंधित स्टडी सेट्स

Literary Terms for Year One Eng. Lit BA(hons)

View Set

PEDS Prep U Chapter 5: Growth and Development of the Preschooler

View Set

Med Surg 1 Ch45 Adaptive Quizzing

View Set

Give meanings for the following terms

View Set