Management > EXAM > MIS 589 WEEK 6 QUIZ QUESTIONS ANS ANSWERS (All)

MIS 589 WEEK 6 QUIZ QUESTIONS ANS ANSWERS

Document Content and Description Below

MIS 589 WEEK 6 QUIZ QUESTIONS ANS ANSWERS Question 1 1 / 1 pts (TCO E) Which of the following is not one of the major categories (or sub-categories) into which network security threats can be pla... ced? Disruption Destruction Controlled chaos Intrusion Disaster Question 2 1 / 1 pts (TCO E) An example of _____ data would be if a computer virus eliminated files on that computer. disruption controlled chaosCorrect! destruction intrusion disaster Question 3 1 / 1 pts (TCO E) A network switch failure is an example of a(n) _____ threat. internal disruptive causal intrusion disaster Question 4 1 / 1 pts (TCO E) Developing _____ helps develop a secure network. rules controls network maps vendor documentation service level agreements Question 5 1 / 1 pts (TCO E) A _____ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. risk assessment backplane mitigating control factor analysis control verification worksheet control test plan Question 6 1 / 1 pts (TCO E) A(n) _____, is an information system that is critical to the survival of an organization. network plan accounting system mission critical application IDS IPS Question 7 1 / 1 pts (TCO E) A(n) _____ is any potential adverse occurrence that can do harm or interrupt the system using the network to cause monetary loss to the organization. asset service level agreement threat security plan network design Question 8 1 / 1 pts (TCO E) Threat of intrusion comes from the government. crackers. outside of the organization. both inside and outside of the organization. inside of the organization. Question 9 1 / 1 pts (TCO E) A(n) _____ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. network cloaking device backup punch card reader uninterruptible power supply service level agreement help desk Question 10 1 / 1 pts (TCO E) A (n) _____ is a special type of virus that spreads itself without human intervention. snake worm Trojan horse boot sector virus stealth virus Question 11 1 / 1 pts (TCO E) A _____ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users’ messages from being processed. denial-of-service attack service level agreement virus spamming scamming Question 12 1 / 1 pts (TCO E) Which of the following is not a method for deterring intrusion? Training end users not to divulge passwords Using a smart card in conjunction with a password to gain access to a computer system Using biometric devices to gain access to a computer system Using a security software package that logs out users if that user is idle for a certain amount of time Performing social engineering Question 13 1 / 1 pts (TCO E) Which of the following type of media is least susceptible to eavesdropping? Fiber optics Twisted pair Microwave Infrared Coaxial cable Question 14 1 / 1 pts (TCO E) Which of the following are usually the first choice for eavesdropping? Unshielded twisted pair Shielded twisted pair Local cables owned by the organization Wireless LANs Fiber optics Question 15 1 / 1 pts (TCO E) A sniffer program is a type of macro-virus. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location. used in a call-back modem. a program that records all LAN messages received for later (unauthorized) analysis. secure hub program. Question 16 1 / 1 pts (TCO E) _____ is an encryption standard that uses a total of 168 bits as the key. Triple DES Dial-back WEP EAP Ciphering Question 17 1 / 1 pts (TCO E) A _____ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization’s network. firewall token system ANI call-back modem firefighter Question 18 1 / 1 pts (TCO E) A security hole is a(n) Correct! malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location. packet-level firewall. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution. ANI system. Question 19 1 / 1 pts (TCO E) IP spoofing means to fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation. illegally tape or listen in on telephone conversations. detect and prevent denial-of-service attacks. act as an intermediate host computer between the Internet and the rest of the organization’s networks. Question 20 1 / 1 pts (TCO E) IP security protocol is focused on web applications. is primarily used to encrypt e-mail. is a policy which makes public key encryption work on the Internet. sits between IP at the network layer and TCP/UDP at the transport layer. [Show More]

Last updated: 2 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$13.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

80
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 20, 2021

Number of pages

7

Written in

Seller


seller-icon
Ryscol

Member since 4 years

7 Documents Sold

Reviews Received
6
0
0
0
0
Additional information

This document has been written for:

Uploaded

Feb 20, 2021

Downloads

 0

Views

 80

Document Keyword Tags

Recommended For You

Get more on EXAM »

$13.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·