Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIS 333 Pre-test Questions and Answers Fall, Exams of Nursing

CIS 333 Pre-test Questions and Answers Fall

Typology: Exams

2022/2023

Available from 09/03/2023

Matthewnl
Matthewnl 🇺🇸

214 documents

1 / 67

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CIS 333 Pre-test Questions and Answers Fall
1 out of 1 points
is the process of transforming data from
cleartext into ciphertext.
Answer
Selected
Answer:
Encrypti
on
Correct
Answer:
Encrypti
on
Question 2
1 out of 1 points
What term is used to describe the amount of time that an IT
system, application, or data is not available to users?
Answer
Selected
Answer:
downti
me
Correct
Answer:
downti
me
Question 3
0 out of 1 points
The tunnel can be created between a remote workstation using
the public Internet and a VPN router or a secure browser and
Web site.
Answer
Selected
Answer: Hypertext Transfer Protocol (HTTP)
Correct
Answer:
Secure Sockets Layer virtual private
network
(SSL-VPN)
Question 4
0 out of 1 points
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43

Partial preview of the text

Download CIS 333 Pre-test Questions and Answers Fall and more Exams Nursing in PDF only on Docsity!

1 out of 1 points is the process of transforming data from cleartext into ciphertext. Answer Selected Answer: Encrypti on Correct Answer: Encrypti on

- Question 2 1 out of 1 points What term is used to describe the amount of time that an IT system, application, or data is not available to users? Answer Selected Answer: downti me Correct Answer: downti me - Question 3 0 out of 1 points The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and Web site. Answer Selected Answer: Hypertext Transfer Protocol (HTTP) Correct Answer: Secure Sockets Layer virtual private network (SSL-VPN) - Question 4 0 out of 1 points

A examines the network layer address and routes packets based on routing protocol path determination decisions. Answer Selected Answer: proxy server

1 out of 1 points

Correct Answer: threa ts

- Question 9 1 out of 1 points The director of IT security is generally in charge of ensuring that the conforms to policy. Answer Selected Answer: Workstatio n Domain Correct Answer: Workstatio n Domain - Question 10 0 out of 1 points A is a collection of computers connected to one another or to a common connection medium. Answer Selected Answer: virtual private network (VPN) Correct Answer: local area network (LAN) - Question 11 0 out of 1 points What term is used to describe streamlining processes with automation or simplified steps? Answer Selected Answer: (^) protocol convergence Correct Answer: business process engineering - Question 12

Correc t Inter n et Answer: Intern et

- Question 13 1 out of 1 points A common DSL service is , where the bandwidth is different for downstream and upstream traffic. Answer Selected Answer: (^) asymmetric digital subscriber line (ADSL) Correct Answer: asymmetric digital subscriber line (ADSL) - Question 14 What is meant by DS0? Answer Selected 0 out of 1 points Answer: (^) A strategy that uses a device to provide electrical power for IP phones from the RJ-45 8-pin jacks directly to the workstation outlet. Correct Answer: A basic digital signaling rate that corresponds to one voice- frequency-equivalent channel. - Question 15 1 out of 1 points Voice and unified communications are applications that use 64-byte IP packets. Answer Selected Answer: real- time Correct Answer: real-

time

- Question 16 1 out of 1 points

Selected Answer: (^) asynchronous transfer mode (ATM)

Correct Answer: frame relay

- Question 20 0 out of 1 points As users upgrade LANs to GigE or 10GigE, switches must support and data IP traffic. Answer Selected Answer: networ ks Correct Answer: voice - Question 21 A is a software program that performs one of two 1 out of 1 points functions: brute-force password attack to gain unauthorized access to a system, or recovery of passwords stored in a computer system. Answer Selected Answer: passwor d cracker Correct Answer: passwor d cracker - Question 22 Prior to VoIP, attackers would use wardialers to. Answer Selected Answer: (^) all of the above Correct Answer: all of t h e a b o v e - Qu est ion

Correct Answer: all of the above

- Question 24 1 out of 1 points Black-hat hackers generally poke holes in systems, but do not attempt to disclose they find to the administrators of those systems. Answer Selected Answer: vulnerabil it ies Correct Answer: vulnerabil it ies - Question 25 1 out of 1 points A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of . Answer Selected Answer: adwa re Correct Answer: adwa re - Question 26 An attempt to exploit a vulnerability of a computer or network component is the definition of. Answer Selected Answer: a t t a ck C o r r e c t

Answer: atta ck

- Question 27 1 out of 1 points 0 out of 1 points A protocol analyzer or is a software program that enables a computer to monitor and capture network traffic. Answer

Selected Answer: man-in-the- middle attack Correct Answer: (^) man-in-the- middle attack

- Question 31 0 out of 1 points

What name is given to a risk-analysis method that uses relative ranking to provide further definition of the identified risks in order to determine responses to them? Answer Selected Answer: (^) quantitative risk analysis Correct Answer: (^) qualitative risk analysis

- Question 32 0 out of 1 points A parallel test evaluates the effectiveness of the by enabling full processing capability at an alternate data center without interrupting the primary data center. Answer Selected Answer: security plan Correct Answer: DRP - Question 33 0 out of 1 points What name is given to a comparison of security controls in place and the controls that are needed to address all identified threats? Answer Selected Answer: (^) qualitative risk analysis Correct Answer: gap analysis - Question 34 What is meant by risk register? Answer Selected Answer: (^) A list of identified risks that results from the risk- identification process. 1 out of 1 points

- Question 35 RTO identifies the maximum allowable to recover the function. Answer Selected Answer: tim e Correct Answer: tim e - Question 36 1 out of 1 points 0 out of 1 points is the proportion of value of a particular asset likely to be destroyed by a given risk, expressed as a percentage. Answer Selected Answer: (^) Annual rate of occurrence (ARO) Correct Answer: Exposure factor (EF) - Question 37 The process of managing risks starts by identifying. Answer Selected Answer: standa rds Correct Answer: risks - Question 38 0 out of 1 points 0 out of 1 points Risks apply to specific assets. If you multiply the risk by the cost of the asset, the result is the exposure to a specific risk. Answer Selected

Answer: threat Correct Answer: probabi li ty

- Question 39 0 out of 1 points