Identify the letter of the choice that best completes the statement or answers the question




НазваниеIdentify the letter of the choice that best completes the statement or answers the question
страница2/7
Дата конвертации30.10.2012
Размер0.79 Mb.
ТипДокументы
1   2   3   4   5   6   7

CCIS2400 (Security Essentials) Chapter 10 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. Daniel, the network administrator of Global Corporation, wants to apply access control privileges to all users on his network. He should use _____ Access Control to do this.

a.

Mandatory

c.

Secure

b.

Position Based

d.

Entry Level



____ 2. George wants to implement biometric security devices in the corporate office. He wants to use the most common technology in the industry so that he will be able to get the most support. Which type of scanner should he choose?

a.

iris

c.

hand

b.

retina

d.

fingerprint



____ 3. The 802.11b signal is rated to reach as far as _____ feet.

a.

125

c.

515

b.

375

d.

650



____ 4. Most radio frequency WLANs are limited to _____ milliwatts or less.

a.

30

c.

100

b.

70

d.

250



____ 5. _____ occurs when a strong signal on one wire of a network cable is picked up by an adjacent wire.

a.

Radio frequency interference

c.

Attenuation

b.

Electromagnetic interference

d.

Near end crosstalk



____ 6. _____ cages are often used for testing in electronic labs where stray EMI fields must be kept out.

a.

Faraday

c.

Einstein

b.

Newton

d.

Thompson



____ 7. In early summer, a fire occurred in the electrical room of one of XYZ Corporation’s newly constructed satellite offices. Investigators determined that the source of the fire was faulty electrical wiring. What class of fire was this?

a.

Class A

c.

Class C

b.

Class B

d.

Class D



____ 8. Typical fuel sources for a Class B fire are _____.

a.

wood, paper, and textiles

c.

live or energized electric wires

b.

magnesium, titanium, and potassium

d.

oil, solvents, paints, and grease



____ 9. A _____ clean agent system should be used in areas of high voltage and electronics.

a.

dry pipe

c.

high pressure carbon dioxide

b.

dry chemical

d.

FE-13



____ 10. Which of the following functions can be performed by a UPS?

a.

It can prevent any new users from logging on

b.

It can disconnect users and shut down the server

c.

It can serve as a surge protector

d.

both a and b

e.

a, b, and c



____ 11. Val decides to implement RAID on her database server. She only has two hard disks available and wants to ensure that she has data redundancy. What level of RAID should she implement?

a.

0

c.

2

b.

1

d.

5



____ 12. RAID _____ can improve the performance of a server by independently reading data from the different drives, which makes it the most efficient of any RAID technology.

a.

1

c.

3

b.

2

d.

5



____ 13. The primary utility that a business continuity plan should address is _____ service.

a.

phone

c.

electrical

b.

water

d.

gas



____ 14. RAID _____ is configured as a level 0 striped array, but each segment is a RAID 3 array.

a.

10

c.

74

b.

53

d.

100



____ 15. In a _____ backup, the archive bit is cleared.

a.

full

d.

both a and b

b.

incremental

e.

both b and c

c.

differential



____ 16. Rennie has just completed writing the purpose and scope unit of his disaster recovery plan. Which of the following topics should he have included?

a.

Systems and operations

b.

General procedures

c.

Types of computer service disruptions

d.

Use of alternate sites



____ 17. Which of these is a goal of physical security>

a.

Preventing unauthorized users from vandalizing equipment

c.

Creating a disaster recovery plan

b.

Using a redundant-array of ISA drives

d.

Configuring packet filters



____ 18. Which of these is NOT a context in which access-control is used?

a.

Developing an infrastructure for fire suppression

c.

Configuring an OS to enforce controls

b.

Developing rules on a network device to permit or deny packets

d.

Restricting a user to accessing on the essential resources necessary for his/her job



____ 19. Which of these should NOT be removed or disabled in a file server?

a.

RAID

c.

Parallel ports

b.

USB ports

d.

Floppy drives



____ 20. A(n) _______________ lock is the least secure type of door lock.

a.

Preset

c.

Cipher

b.

Deadbolt

d.

Fob



____ 21. Which of these does NOT need to be addressed when hardening the physical security of a building?

a.

Exposed door hinges

c.

Suspended ceilings

b.

HVAC ductwork

d.

Shag carpeting



CCIS2400 (Security Essentials) Chapter 11 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. A _____ policy is a critical element in information security.

a.

asset

c.

risk

b.

security

d.

threat



____ 2. XYZ Corp recently released a new version of their Web-based inventory management software. Unfortunately a bug in their code was discovered that would allow an attacker to take full control of the host Web server. In information security this is considered to be a(n) _____.

a.

flaw

c.

vulnerability

b.

exploit

d.

weakness



____ 3. In information security, sending a worm to an unprotected computer is an example of a(n) _____.

a.

exploit

c.

threat agent

b.

vulnerability

d.

threat



____ 4. _____ assets include buildings, automobiles, and other noncomputer equipment.

a.

hardware

c.

physical

b.

fixed

d.

structured



____ 5. A server _____ is a group of networked servers housed in one location.

a.

cluster

c.

warehouse

b.

datacenter

d.

farm



____ 6. When a spy steals a production schedule it is an example of _____.

a.

sabotage or vandalism

c.

espionage

b.

extortion

d.

theft



____ 7. When a program does not function under new version of operating system it is categorized as a _____.

a.

software failure

c.

compromise of intellectual property

b.

technical obsolescence

d.

utility interruption



____ 8. Reg was recently hired as a security consultant for XYZ Corp. He wants to compare the company’s assets against a database of known vulnerabilities and produce a discovery report that exposes a vulnerability and assesses its severity. He needs to use a vulnerability _____ to do this job.

a.

monitor

c.

scanner

b.

tracker

d.

sniffer



____ 9. The theft of a mouse on a client computer would rank as a _____ vulnerability.

a.

small impact

c.

catastrophic

b.

significant

d.

no impact



____ 10. The theft of the latest product research and development data could be considered as a _____ vulnerability.

a.

small impact

c.

significant

b.

major

d.

catastrophic



____ 11. If Amanda purchases additional car insurance to let the insurance company absorb the loss and pay her if her car stereo is stolen, she has _____ the risk.

a.

accepted

c.

transferred

b.

diminished

d.

eliminated



____ 12. _____ are typically concerned about cost of security protection for attacks that may not materialize

a.

Users

c.

Systems support personnel

b.

Management personnel

d.

All of the above



____ 13. The model of _____ is mostly found in high-level security government organizations.

a.

trusting everyone all of the time

b.

trusting no one at any time

c.

trusting some people some of the time

d.

trusting most people most of the time



____ 14. There are certain things that a security policy should do and certain things a security policy must do. Which of the following answers properly complete the following sentence? A security policy should _____.

a.

state reasons why the policy is necessary

b.

outline how violations will be handled

c.

balance protection with productivity

d.

both a and b

e.

a, b, and c



____ 15. The policy design team should have a _____ as a member.

a.

senior level administrator

d.

both a and b

b.

member of the legal staff

e.

a, b, and c

c.

representative from the user community



____ 16. The following statement is an example of _____ in a security policy: “Operators should not be able to make changes to production applications or system software libraries, and database changes should be administered by database administration personnel only.”

a.

due care

c.

need to know

b.

separation of duties

d.

acceptable use



____ 17. A(n) _______________ is a weakness that allows a threat agent to bypass security.

a.

Vulnerability

c.

Rist

b.

Exploit

d.

Mitigation



____ 18. The _______________ defines the overall process involved with the developing a security policy.

a.

Security policy cycle

c.

Monitoring scope

b.

Risk identification cycle

d.

Evaluation cycle



____ 19. Which of these is NOT a step of risk identification?

a.

Inventory the assets

c.

Determine what threates exist against the assets

b.

Decide what to do about the risks

d.

Write the security policy



____ 20. Which of these is NOT an asset?

a.

Data

c.

Software

b.

Buildings

d.

Loans



____ 21. Which of these is NOT an attribute that should be compiled for all hardware when performing an asset identification?

a.

The name of the equipment

c.

MAC and IP addresses

b.

The manufacturer’s serial number

d.

Cost


1   2   3   4   5   6   7

Похожие:

Identify the letter of the choice that best completes the statement or answers the question iconSection 1 Analytic Question Answers

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers to questions not answered at Mayor’s Question Time on

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers arising from the Plenary Assembly Question and Answer Session with Transport for London

Identify the letter of the choice that best completes the statement or answers the question iconNo fee of any kind may be charged for the material; all copied material must clearly identify its source and contain the statement on copyright shown below

Identify the letter of the choice that best completes the statement or answers the question iconFinancial statements Income statement Balance sheet Statement of cash flows Statement of changes in equity Notes to and forming part of the financial report

Identify the letter of the choice that best completes the statement or answers the question iconAppendix 1 London Assembly (Mayor’s Question Time) 12 December 2007 Transcript – Question and Answer Session

Identify the letter of the choice that best completes the statement or answers the question iconPhil265/Rels265 Final Exam 31 Multiple choice or True-False worth 1 mark each 3 Short Answer Questions from choice of 5 worth 3 marks each (paragraph or two in length) Introduction to Philosophy

Identify the letter of the choice that best completes the statement or answers the question iconThe Very Handy Manual: How to Catch and Identify Bees

Identify the letter of the choice that best completes the statement or answers the question icon20 Answers

Identify the letter of the choice that best completes the statement or answers the question iconLetter from the President


Разместите кнопку на своём сайте:
lib.convdocs.org


База данных защищена авторским правом ©lib.convdocs.org 2012
обратиться к администрации
lib.convdocs.org
Главная страница