Computer Science > EXAM > CSIA 310 – Midterm Exam Graded A+ (All)
_________________ refers to the ability to verify a system's or a person's identity. - ANSWER Authentication You have been asked to reduce the number of applications you host on your internal netwo... rk . You decide to use an online version of the company's accounting software. This may be an example of which of the following? - ANSWER Cloud computing and SaaS Which of the following best describe data? (Select two.) - ANSWER * Facts and figures * Collection of recordings Tim Berners-Lee, the original creator of the World Wide Web, envisions the future Web 3.0 more resembling which of the following? - ANSWER A database Packet-switched networks use independent routing, which allows which of the following? - ANSWER Packets to take an alternate route if a route is unavailable You have just installed a software patch without reviewing its intended purpose or understanding its potential effect. This is an example of ________________. - ANSWER Blind patching _________________ is the assurance that a message wasn't captured and tampered with during communication transit. - ANSWER Integrity You have just installed a client/server network. Which is NOT an advantage of the client/server model? - ANSWER Eliminates a single point of failure The World Wide Web is technically the same as the Internet. - ANSWER False Which of the following has NOT been a factor in the development of the Internet of Things? - ANSWER Stringent federal legislation requiring use of encryption on all "smart" devices Denial-of-service (DoS) attacks stop access to authorized users of a Web site. - ANSWER True Which of the following are required to establish a VPN connection? (Select three.) - ANSWER * VPN client * VPN server * Transmission media You are designing a customer-service strategy for a large company. The client has asked that you incorporate full two-way communication between service staff and the customer. Which of the following methods would you suggest? (Select two.) - ANSWER * E-mail support * VoIP Despite the overwhelming trend of companies having an online presence, some companies do not see an adequate return on investment from a Web site; or their Web site generates very little interest. Which of these following characteristics might NOT be a factor for poor performance by a Web site? - ANSWER 7 / 24 / 365 availability Many security features are available for building a secure system. Which of the following describe categories of security features? (Select three.) - ANSWER * Authentication * Auditing * Encryption The most important single thing an organization can do to defend itself against network attacks and malware is to keep systems patched and updated. - ANSWER True "Contact Us" forms are an example of which of the following? - ANSWER Limited two-way communication You have to connect three remote employees to the corporate network. Which of the following technologies would you use? - ANSWER VPN Which protocol is used by HTTPS for encrypting data between the client and the host? - ANSWER SSL Missing or insufficient session information is no longer a privacy concern with modern browsers. - ANSWER False Kathleen is an avid user of social networking sites. She continues to post detailed information about upcoming trips, personal photos showing children, and her phone number and contact information. Which of the following OWASP privacy threats refers to her situation? - ANSWER Operator-sided data leakage Small files containing information you enter on some Web pages, including username and password combinations, are called which of the following? - ANSWER Cookies Anita has recently logged on a shopping site to purchase a new bicycle and bike shorts. She is concerned that the communication link is not secure. Which of the following could she check to verify a secure link? - ANSWER Verify that HTTPS is being used in the URL Which of the following can be used in a social engineering attack? (Select three.) - ANSWER * Dumpster diving * Shoulder surfing [Show More]
Last updated: 2 years ago
Preview 1 out of 6 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 21, 2022
Number of pages
6
Written in
This document has been written for:
Uploaded
Sep 21, 2022
Downloads
0
Views
127
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·