Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIST 1601 Exam 1: Chapters 1 & 2 - Information Security Fundamentals, Exams of Information Security and Markup Languages

A comprehensive set of multiple-choice questions covering key concepts from chapters 1 and 2 of the cist 1601 course, focusing on information security fundamentals. The questions delve into topics such as network security paradigms, hacking, firewalls, cookies, osi model layers, threats to computer systems, and security best practices. This resource is valuable for students preparing for their first exam in the course, offering a structured review of essential concepts.

Typology: Exams

2024/2025

Available from 12/07/2024

Martin-Ray-1
Martin-Ray-1 🇺🇸

5

(8)

6.1K documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CIST 1601-Exam 1-Chapters 1&2 -
Information Security Fundamentals SE.
1. What are zone transfers? - Answer:::✔✔Sends changes from one
server to another.
2. What is layered security? - Answer:::✔✔A segmented network
with a firewall and a solid password polocy.
3. What is hacking? - Answer:::✔✔Act of breaking into a secure
system.
4. Network security paradigms can be classified as each of the
following EXCEPT: - Answer:::✔✔system security.
5. What is the main purpose of a cookie? - Answer:::✔✔To Idendify
users when they return to a particular web site.
6. What is the term given to individuals that are typically law abiding
citizens, but may venture into illegal activities? -
Answer:::✔✔Gray hat hackers.
7. What is the session layer responsible for? - Answer:::✔✔Connects
the entity to the transmission media.
pf3
pf4
pf5
pf8

Partial preview of the text

Download CIST 1601 Exam 1: Chapters 1 & 2 - Information Security Fundamentals and more Exams Information Security and Markup Languages in PDF only on Docsity!

CIST 1601-Exam 1-Chapters 1&2 -

Information Security Fundamentals SE.

  1. What are zone transfers? - Answer:::✔✔Sends changes from one server to another.
  2. What is layered security? - Answer:::✔✔A segmented network with a firewall and a solid password polocy.
  3. What is hacking? - Answer:::✔✔Act of breaking into a secure system.
  4. Network security paradigms can be classified as each of the following EXCEPT: - Answer:::✔✔system security.
  5. What is the main purpose of a cookie? - Answer:::✔✔To Idendify users when they return to a particular web site.
  6. What is the term given to individuals that are typically law abiding citizens, but may venture into illegal activities? - Answer:::✔✔Gray hat hackers.
  7. What is the session layer responsible for? - Answer:::✔✔Connects the entity to the transmission media.
  1. What is war-driving? - Answer:::✔✔Act of driving in a vehicle with a wireless laptop computer to exploit existing wireless networks.
  2. which of the following is NOT a characteristic of a firewall? - Answer:::✔✔It hides your network.
  3. What is a proxy server? - Answer:::✔✔A proxy server is used to hide internal IP addresses and present a single IP address to the outside world.
  4. Which of the following is a true statement about OSI model layers? - Answer:::✔✔Any layer can communicate only with the layer directly above or below it.
  5. Giving the Hexadecimal value of FF-FF-FF-FF, what is the corret dotted decimal value? - Answer:::✔✔255.255.255.
  6. Which of the following is NOT considered a type of threat to a computer system? - Answer:::✔✔Pop-ups
  7. Which of the following is the most balanced reaction to threats on the network security? - Answer:::✔✔Realistically assessing your system.

 Integrity  Availability - Answer:::✔✔Privacy

  1. What is a service level agreement (SLA)? o A guarantee of a specific level of service o An agreement to support another company in the event of a disaster o A contract with an ISP for a specific level of bandwidth o A contract with a legal entity to limit your asset loss liability - Answer:::✔✔A guarantee of a specific level of service
  2. A service Level Agreement (SLA) defines the relationship between, and the contractual responsibilities of, providers and recipients of service. Which of the following characteristics are most important when designing an SLA? (select two) A. Industry standard templates for all SLAs to ensure corporate compliance. B. Employe vetting procedures that don't apply to contract labor. C. Detailed provider responsibilities for all continuity and disaster recovery mechanisms.

D. Clear and detailed descriptions of penalties if the level of service is not provided; - Answer:::✔✔C. Detailed provider responsibilities for all continuity and disaster recovery mechanisms. E. Clear and detailed descriptions of penalties if the level of service is not provided;

  1. You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device? A. Recsource allocation B. Acceptable use C. SLA D. Change management - Answer:::✔✔Change management
  2. When you inform an employee that they are being terminated, what is the most important activity? A. allowing them to collect their personal items B. Allowing them to complete their current work projects C. Disabling their network access D. Giving them two weeks'notice - Answer:::✔✔Disabling their network access

A. Reasonable precautions based on industry best practices are utilized and documented B. Legal disclaimers are consistent - Answer:::✔✔Reasonable precautions based on industry best practices are utilized and documented

  1. Which of the following is an example of a strong password? - Answer:::✔✔a8bT11$yi
  2. Which of the following is a recommendation to use when a specific standard or procedure does not exist? - Answer:::✔✔Guideline
  3. Which of the following is the best protection against security violations? - Answer:::✔✔Defense in-depth
  4. What is the primary of source code escrow? - Answer:::✔✔To obtain change rights over software after the vendor goes out of business
  5. Change control should be used to oversee and manage changes over what aspect of an organization? - Answer:::✔✔Every aspect
  1. You have recently discovered that a network attack has compromised your database server. In the process, customer credit card numbers might have been taken by an attacker. You have stopped the attack and put measures in place to prevent the same incident from occurring in the future. What else might you be legally required to do? - Answer:::✔✔Contact your customers to let them know about the security breach