



























































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CIS 333 Pre-test Questions and Answers Fall
Typology: Exams
1 / 67
This page cannot be seen from the preview
Don't miss anything!
1 out of 1 points is the process of transforming data from cleartext into ciphertext. Answer Selected Answer: Encrypti on Correct Answer: Encrypti on
- Question 2 1 out of 1 points What term is used to describe the amount of time that an IT system, application, or data is not available to users? Answer Selected Answer: downti me Correct Answer: downti me - Question 3 0 out of 1 points The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and Web site. Answer Selected Answer: Hypertext Transfer Protocol (HTTP) Correct Answer: Secure Sockets Layer virtual private network (SSL-VPN) - Question 4 0 out of 1 points
A examines the network layer address and routes packets based on routing protocol path determination decisions. Answer Selected Answer: proxy server
1 out of 1 points
Correct Answer: threa ts
- Question 9 1 out of 1 points The director of IT security is generally in charge of ensuring that the conforms to policy. Answer Selected Answer: Workstatio n Domain Correct Answer: Workstatio n Domain - Question 10 0 out of 1 points A is a collection of computers connected to one another or to a common connection medium. Answer Selected Answer: virtual private network (VPN) Correct Answer: local area network (LAN) - Question 11 0 out of 1 points What term is used to describe streamlining processes with automation or simplified steps? Answer Selected Answer: (^) protocol convergence Correct Answer: business process engineering - Question 12
Correc t Inter n et Answer: Intern et
- Question 13 1 out of 1 points A common DSL service is , where the bandwidth is different for downstream and upstream traffic. Answer Selected Answer: (^) asymmetric digital subscriber line (ADSL) Correct Answer: asymmetric digital subscriber line (ADSL) - Question 14 What is meant by DS0? Answer Selected 0 out of 1 points Answer: (^) A strategy that uses a device to provide electrical power for IP phones from the RJ-45 8-pin jacks directly to the workstation outlet. Correct Answer: A basic digital signaling rate that corresponds to one voice- frequency-equivalent channel. - Question 15 1 out of 1 points Voice and unified communications are applications that use 64-byte IP packets. Answer Selected Answer: real- time Correct Answer: real-
time
- Question 16 1 out of 1 points
Selected Answer: (^) asynchronous transfer mode (ATM)
Correct Answer: frame relay
- Question 20 0 out of 1 points As users upgrade LANs to GigE or 10GigE, switches must support and data IP traffic. Answer Selected Answer: networ ks Correct Answer: voice - Question 21 A is a software program that performs one of two 1 out of 1 points functions: brute-force password attack to gain unauthorized access to a system, or recovery of passwords stored in a computer system. Answer Selected Answer: passwor d cracker Correct Answer: passwor d cracker - Question 22 Prior to VoIP, attackers would use wardialers to. Answer Selected Answer: (^) all of the above Correct Answer: all of t h e a b o v e - Qu est ion
Correct Answer: all of the above
- Question 24 1 out of 1 points Black-hat hackers generally poke holes in systems, but do not attempt to disclose they find to the administrators of those systems. Answer Selected Answer: vulnerabil it ies Correct Answer: vulnerabil it ies - Question 25 1 out of 1 points A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of . Answer Selected Answer: adwa re Correct Answer: adwa re - Question 26 An attempt to exploit a vulnerability of a computer or network component is the definition of. Answer Selected Answer: a t t a ck C o r r e c t
Answer: atta ck
- Question 27 1 out of 1 points 0 out of 1 points A protocol analyzer or is a software program that enables a computer to monitor and capture network traffic. Answer
Selected Answer: man-in-the- middle attack Correct Answer: (^) man-in-the- middle attack
- Question 31 0 out of 1 points
What name is given to a risk-analysis method that uses relative ranking to provide further definition of the identified risks in order to determine responses to them? Answer Selected Answer: (^) quantitative risk analysis Correct Answer: (^) qualitative risk analysis
- Question 32 0 out of 1 points A parallel test evaluates the effectiveness of the by enabling full processing capability at an alternate data center without interrupting the primary data center. Answer Selected Answer: security plan Correct Answer: DRP - Question 33 0 out of 1 points What name is given to a comparison of security controls in place and the controls that are needed to address all identified threats? Answer Selected Answer: (^) qualitative risk analysis Correct Answer: gap analysis - Question 34 What is meant by risk register? Answer Selected Answer: (^) A list of identified risks that results from the risk- identification process. 1 out of 1 points
- Question 35 RTO identifies the maximum allowable to recover the function. Answer Selected Answer: tim e Correct Answer: tim e - Question 36 1 out of 1 points 0 out of 1 points is the proportion of value of a particular asset likely to be destroyed by a given risk, expressed as a percentage. Answer Selected Answer: (^) Annual rate of occurrence (ARO) Correct Answer: Exposure factor (EF) - Question 37 The process of managing risks starts by identifying. Answer Selected Answer: standa rds Correct Answer: risks - Question 38 0 out of 1 points 0 out of 1 points Risks apply to specific assets. If you multiply the risk by the cost of the asset, the result is the exposure to a specific risk. Answer Selected
Answer: threat Correct Answer: probabi li ty
- Question 39 0 out of 1 points