Information Technology > EXAM > MIS 589 WEEK 6 QUIZ QUESTIONS AND ANSWERS (All)

MIS 589 WEEK 6 QUIZ QUESTIONS AND ANSWERS

Document Content and Description Below

MIS 589 WEEK 6 QUIZ QUESTIONS AND ANSWERSMIS 589 WEEK 6 QUIZ QUESTIONS AND ANSWERS Question 1 1 / 1 pts (TCO E) Which of the following is not one of the major categories (or sub-categories) into wh... ich network security threats can be placed? Disruption Destruction Correct! Controlled chaos Intrusion Disaster Question 2 1 / 1 pts (TCO E) An example of _____ data would be if a computer virus eliminated files on that computer. disruption controlled chaosCorrect! destruction intrusion disaster Question 3 1 / 1 pts (TCO E) A network switch failure is an example of a(n) _____ threat. internal Correct! disruptive causal intrusion disaster Question 4 1 / 1 pts (TCO E) Developing _____ helps develop a secure network. rules Correct! controls network maps vendor documentation service level agreements Question 5 1 / 1 pts (TCO E) A _____ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. Correct! risk assessment backplane mitigating control factor analysis control verification worksheet control test plan Question 6 1 / 1 pts (TCO E) A(n) _____, is an information system that is critical to the survival of an organization. network plan accounting system Correct! mission critical application IDS IPS Question 7 1 / 1 pts (TCO E) A(n) _____ is any potential adverse occurrence that can do harm or interrupt the system using the network to cause monetary loss to the organization. asset service level agreement Correct! threat security plan network design Question 8 1 / 1 pts (TCO E) Threat of intrusion comes from the government. crackers. outside of the organization. Correct! both inside and outside of the organization. inside of the organization. Question 9 1 / 1 pts (TCO E) A(n) _____ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. network cloaking device backup punch card reader Correct! uninterruptible power supply service level agreement help desk Question 10 1 / 1 pts (TCO E) A (n) _____ is a special type of virus that spreads itself without human intervention. snake Correct! worm Trojan horse boot sector virus stealth virus Question 11 1 / 1 pts (TCO E) A _____ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users’ messages from being processed. Correct! denial-of-service attack service level agreement virus spamming scamming Question 12 1 / 1 pts (TCO E) Which of the following is not a method for deterring intrusion? Training end users not to divulge passwords Using a smart card in conjunction with a password to gain access to a computer system Using biometric devices to gain access to a computer system Using a security software package that logs out users if that user is idle for a certain amount of time Correct! Performing social engineering Question 13 1 / 1 pts (TCO E) Which of the following type of media is least susceptible to eavesdropping? Correct! Fiber optics Twisted pair Microwave Infrared Coaxial cable Question 14 1 / 1 pts (TCO E) Which of the following are usually the first choice for eavesdropping? Unshielded twisted pair Shielded twisted pair Local cables owned by the organization Correct! Wireless LANs Fiber optics Question 15 1 / 1 pts (TCO E) A sniffer program is a type of macro-virus. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location. used in a call-back modem. Correct! a program that records all LAN messages received for later (unauthorized) analysis. secure hub program. Question 16 1 / 1 pts (TCO E) _____ is an encryption standard that uses a total of 168 bits as the key. Correct! Triple DES Dial-back WEP EAP Ciphering Question 17 1 / 1 pts (TCO E) A _____ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization’s network. Correct! firewall token system ANI call-back modem firefighter Question 18 1 / 1 pts (TCO E) A security hole is a(n) Correct! malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location. packet-level firewall. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution. ANI system. Question 19 1 / 1 pts (TCO E) IP spoofing means to Correct! fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation. illegally tape or listen in on telephone conversations. detect and prevent denial-of-service attacks. act as an intermediate host computer between the Internet and the rest of the organization’s networks. Question 20 1 / 1 pts (TCO E) IP security protocol is focused on web applications. is primarily used to encrypt e-mail. is a policy which makes public key encryption work on the Internet. Correct! sits between IP at the network layer and TCP/UDP at the transport layer. [Show More]

Last updated: 1 year ago

Preview 1 out of 7 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Also available in bundle (1)

MN 589 WEEK 1, 2, 3, 4, 5, 6 & 7 QUIZZES WITH ANSWERS(BUNDLE) | LATEST ANSWERS

MIS 589 Week 1 Quiz with Answers | 100% CORRECT MIS 589 Week 2 Quiz with Answers | COMLETE GUIDE MIS 589 Week 3 Quiz with Answers | VERIFIED SOLUTION MIS 589 Week 4 Quiz with Answers | LATEST...

By PerfectGrade 3 years ago

$48

7  

Reviews( 0 )

$13.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
56
0

Document information


Connected school, study & course


About the document


Uploaded On

Jan 30, 2021

Number of pages

7

Written in

Seller


seller-icon
PerfectGrade

Member since 3 years

19 Documents Sold


Additional information

This document has been written for:

Uploaded

Jan 30, 2021

Downloads

 0

Views

 56

Document Keyword Tags

Recommended For You

Get more on EXAM »

$13.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·