Identify the letter of the choice that best completes the statement or answers the question




НазваниеIdentify the letter of the choice that best completes the statement or answers the question
страница5/7
Дата конвертации30.10.2012
Размер0.79 Mb.
ТипДокументы
1   2   3   4   5   6   7

CCIS2400 (Security Essentials) Chapter 5 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. _____ cables have typically been used in cable plants.

a.

fiber-optic

c.

twisted-pair

b.

coaxial

d.

all of the above



____ 2. Category _____ cable was the first cable designed for data use.

a.

1

c.

4

b.

3

d.

5



____ 3. _____ fiber-optic cables are often used for long-distance telephone service, where the light can be transmitted up to 50 miles before it must be repeated.

a.

Single-mode

c.

Transmission-mode

b.

Multimode

d.

Dual-mode



____ 4. What is the typical size of fiber-optic cable used for LANs?

a.

50/125

c.

100/140

b.

62.5/125

d.

82.5/150



____ 5. PC Cards Type II Memory Card are typically used in _____.

a.

Portable printers

c.

Solid-state notebook hard drives

b.

Digital cameras

d.

Video games



____ 6. A _____ is responsible for holding the files and managing the processes that provide resources to network users.

a.

workstation

c.

terminal

b.

server

d.

storage area network



____ 7. A _____ is a common attack used against a router.

a.

DoS

d.

both a and b

b.

man-in-the-middle

e.

a, b, and c

c.

hijacking



____ 8. More attackers gain access to the internal cable plant through _____ than any other method.

a.

impersonation attacks

c.

Denial of Service attacks

b.

social engineering

d.

forced entry



____ 9. In a _____ attack against a PBX an attacker observes information about calls instead of the contents of the messages.

a.

traffic analysis

c.

disclosure of information

b.

denial of service

d.

data modification



____ 10. In a _____ attack against a PBX an attacker breaks into the PBX system to make free long-distance telephone calls.

a.

data modification

c.

theft of service

b.

disclosure of information

d.

traffic analysis



____ 11. _____ packet filtering permits or denies each packet based strictly on the rule base.

a.

Rule-based

c.

Stateful

b.

Dynamic

d.

Stateless



____ 12. A _____ IDS sends information about what happened, but does not take action.

a.

passive

c.

host-based

b.

static

d.

network-based



____ 13. In computer networking, _____ refers to the physical layout of the network devices, how they are interconnected, and how they communicate.

a.

architecture

c.

structure

b.

topology

d.

protocol



____ 14. What is the beginning address of a private Class C network?

a.

172.16.0.0

c.

192.168.0.0

b.

10.10.0.0

d.

192.168.8.0



____ 15. _____ is typically used today on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).

a.

SAT

c.

DAT

b.

NAT

d.

PAT



____ 16. A _____ allows scattered users to be logically grouped together, even though they may be attached to different switches.

a.

VLAN

c.

NAT

b.

MAN

d.

DMZ



____ 17. Floppy disks are known as ____________ media

a.

magnetic

c.

flash

b.

optical

d.

electronic



____ 18. ____________ contains a dedicated controller chip.

a.

Compact-Flash

c.

A USB memory sick

b.

Smart-Media

d.

RAM BIOS



____ 19. A(n) ____________ receives a packet from one network device and sends to to all devices on the network.

a.

hub

c.

router

b.

switch

d.

IDS



____ 20. Which of these is NOT a component of physical security?

a.

door locks

c.

alarm systems

b.

antivirus software

d.

lighting



CCIS2400 (Security Essentials) Chapter 4 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. Early programs, that performed functions such as displaying an instant calculator, or address book, and were activated by pressing a hot key, were called _____.

a.

ESLs

c.

SUVs

b.

TSRs

d.

TSBs



____ 2. In Linux, one service that depends on another service to function properly is sometimes called a _____.

a.

dependency

c.

child

b.

parent

d.

peer



____ 3. When a service is set to _____ mode, it allows Windows to start a service when it is needed.

a.

automatic

c.

standard

b.

disabled

d.

manual



____ 4. When a service is set to _____ mode it starts every time that the computer is turned on.

a.

automatic

c.

resume

b.

launch

d.

recovery



____ 5. Port _____ is used by the Telnet application.

a.

20

c.

23

b.

21

d.

25



____ 6. What is the name of the service that enables computers to automatically download and install critical Windows updates?

a.

Wuauserv

c.

Wsupdate

b.

MSDTC

d.

ERSvc



____ 7. The _____ service loads files to memory for later printing.

a.

lpr

c.

printmgr

b.

lpd

d.

spooler



____ 8. A(n) _____ is a major new release of the software incorporating all previous updates along with new features.

a.

Update rollout

c.

Version

b.

Feature pack

d.

Update



____ 9. A(n) _____ is a release of a product that adds functionality but does not address security issues.

a.

Update

c.

Update rollout

b.

Feature pack

d.

Service pack



____ 10. The Windows _____ privilege allows users to create new files and subfolders within the folder, change folder attributes, and view folder ownership and permissions.

a.

read

c.

read and execute

b.

write

d.

modify



____ 11. The Windows _____ privilege allows users to move through folders to reach other files and folders (even if the user does not have permission for those folders).

a.

list folder contents

c.

full control

b.

modify

d.

read and execute



____ 12. The ____ security template applies the default settings to the hard drive on which Microsoft Windows XP was originally installed.

a.

Rootsec.inf

c.

Securews.inf

b.

Compatws.inf

d.

Hisecws.inf



____ 13. The _____ security template sets permissions for the local users group so that legacy programs are more likely to run.

a.

Rootsec.inf

c.

Securews.inf

b.

Compatws.inf

d.

Hisecws.inf



____ 14. John Rankin, the network administrator for XYZ Corporation, wants to manually change the registry on his Windows Server 2003 server, what program will allow him to do this task?

a.

regutil

c.

regedt32

b.

regedit32

d.

regeditor



____ 15. E-mail servers should be protected against _____.

a.

viruses

d.

both a and b

b.

worms

e.

a, b, and c

c.

Trojan horses



____ 16. The _____ is a part of the operating system that facilitates communication among the computers hardware, operating system, applications, and peripheral devices such as hard disks, printers, and video adapters.

a.

RAM

c.

BIOS

b.

CMOS

d.

POST



____ 17. You can start to build defenses for your information systems by creating security ____________.

a.

foundations

c.

pillars

b.

baselines

d.

planes



____ 18. In MS Windows, a program running in the background (such as svchost.exe) is called a ____________.

a.

process

c.

display service

b.

service

d.

parent service



____ 19. A non-security advantagle of disabling a service/process is that ____________________.

a.

ROM is preserved

c.

communication with firmware is enhanced

b.

the OS can perform fewer functions

d.

it frees up RAM



____ 20. A(n) ____________ identifies what program/service on the receiving computer is being accessed.

a.

process

c.

UPD designator

b.

port number

d.

service-initiated socket (SIS)


1   2   3   4   5   6   7

Похожие:

Identify the letter of the choice that best completes the statement or answers the question iconSection 1 Analytic Question Answers

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers to questions not answered at Mayor’s Question Time on

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers arising from the Plenary Assembly Question and Answer Session with Transport for London

Identify the letter of the choice that best completes the statement or answers the question iconNo fee of any kind may be charged for the material; all copied material must clearly identify its source and contain the statement on copyright shown below

Identify the letter of the choice that best completes the statement or answers the question iconFinancial statements Income statement Balance sheet Statement of cash flows Statement of changes in equity Notes to and forming part of the financial report

Identify the letter of the choice that best completes the statement or answers the question iconAppendix 1 London Assembly (Mayor’s Question Time) 12 December 2007 Transcript – Question and Answer Session

Identify the letter of the choice that best completes the statement or answers the question iconPhil265/Rels265 Final Exam 31 Multiple choice or True-False worth 1 mark each 3 Short Answer Questions from choice of 5 worth 3 marks each (paragraph or two in length) Introduction to Philosophy

Identify the letter of the choice that best completes the statement or answers the question iconThe Very Handy Manual: How to Catch and Identify Bees

Identify the letter of the choice that best completes the statement or answers the question icon20 Answers

Identify the letter of the choice that best completes the statement or answers the question iconLetter from the President


Разместите кнопку на своём сайте:
lib.convdocs.org


База данных защищена авторским правом ©lib.convdocs.org 2012
обратиться к администрации
lib.convdocs.org
Главная страница