








































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
⦁ Question 2 1 out of 1 points The goal and objective of a is to provide a consistent definition for how an organization should handle and secure different types of data. Selected Answer: data classification standard Correct Answer: data classification standard
Typology: Exams
1 / 48
This page cannot be seen from the preview
Don't miss anything!
- Question 1 1 out of 1 points The world needs people who understand computer-systems and who can protect computers and networks from criminals and terrorists. Select ed Answer: securi ty Correct Answe r: (^) securi ty - Question 2 1 out of 1 points The goal and objective of a is to provide a consistent definition for how an organization should handle and secure different types of data. Selected Answer: data classification standard Correct Answer: data classification standard - Question 3 1 out of 1 points Today, people working in cyberspace must deal with new and constantly evolving. Select ed Answer: threa ts Correct Answer: threa
ts
- Question 4 The Domain connects remote users to the organization’s IT infrastructure. 1 out of 1 points Answer: Remote Access Correct Answer: Remote Access - Question 5 What term is used to describe the amount of time that an IT system, application, or data is not available to users? Selected Answer: connectiv ity 0 out of 1 points Correct Answer: (^) downtim e - Question 6 The act of transforming cleartext data into undecipherable ciphertext is the definition of. Selected Answer: encrypti on
visible and not decipherable. 1 out of 1 points Correct Answer: The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable.
- Question 10 1 out of 1 points Which of the following describes the Family Educational Rights and Privacy Act (FERPA)? Selected Answer: A U.S. federal law that protects the private data of students, including their transcripts and grades, with which K–12 and higher- education institutions must comply. Correct Answer: A U.S. federal law that protects the private data of students, including their transcripts and grades, with which K–12 and higher- education institutions must comply. - Question 11 1 out of 1 points As users upgrade LANs to GigE or 10GigE, switches must support and data IP traffic. Sele cted Ans wer: (^) voic e Corr ect Ans wer: (^) voic e
- Question 12 1 out of 1 points The total number of errors divided by the total number of bits transmitted is the definition of. Answer: bit error rate Correct Answer: bit error rate - Question 13 What is meant by application convergence? Selected Answer: A basic digital signaling rate that corresponds to one voice- frequency-equivalent channel. Although the true data rate for 0 out of 1 points Correct DS 0 is 64 kbit/s, the effective data rate for a single voice channel when using DS0 is 56 kbit/s. Answer: The integration of applications to enhance productivity. Unified communications is an example of application convergence. Unified communications integrates recorded voice messages into e-mail so that voice messages are retrievable via e-mail. - Question 14 What name is given to a software-based application like WebEx that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real-time discussions with team members or colleagues? Selected Answer: call-detail recording
Selected Answer: den ial of ser vic e (Do S) Correct Answer: bit error rate
- Question 17 What is meant by call control? Selected Answer: A password or personal identification number (PIN) used on phone systems to provide authenticated access to a dial tone. Users have to enter a unique authorization code to make long- distance or toll calls from the organization’s phone system. 0 out of 1 points Correct Answer: The software in a phone system that performs the call switching from an inbound trunk to a phone extension. - Question 18 What is meant by digital subscriber line ( DSL )? Selected Answer: A high-speed digital broadband service that uses copper cabling for Internet access. 1 out of 1 points Correct Answer: A high-speed digital broadband service that uses copper cabling for Internet access. - Question 19 is a technique where multiple light streams can transmit data
through a single strand of fiber. Selected Answer: Dense^ wavelength^ division^ multiplexing (DWDM) 1 out of 1 points Correct Answer: Dense wavelength division multiplexing (DWDM)
- Question 20 1 out of 1 points the ability to provide access to the necessary information without having to invest in many computers and network infrastructure. Selecte d Answer: mobile devices Correct Answer: mobile devices - Question 21 Which of the following is the definition of netcat? Selected Answer: An^ e-mail^ or^ instant-message^ spoofing^ fraud^ attempt^ that 0 out of 1 points targets a specific organization, seeking unauthorized access to confidential data.
Correct Answer: all of the above
- Question 25 A is a tool used to scan IP host devices for open ports that have been enabled. Selected Answer: (^) port scanner
1 out of 1 points Correct Answer: (^) SYN flood
- Question 28 A software program that collects information about Internet usage and 1 out of 1 points . Select ed Answer: adwa re Correct Answer: adwa re - Question 29 What term is used to describe an attack in which the attacker gets 1 out of 1 points between two parties and intercepts messages before transferring them on to their intended destination? Selected Answer: man- in- the- middl e attac
- Question 33 How often should an organization perform a risk management plan? Selected Answer: annual ly 1 out of 1 points Correct Answer: annual ly - Question 34 What is the Project Management Body of Knowledge (PMBOK)? Selected 1 out of 1 points Answer: A collection of the knowledge and best practices of the project management profession. Correct Answer: A collection of the knowledge and best practices of the project management profession. - Question 35 is rapidly becoming an increasingly important aspect of enterprise computing. Selected Answer: Disaster recovery 1 out of 1 points Correct Answer: Disaster recovery
- Question 36 A will help identify not only which functions are critical, but 1 out of 1 points also how quickly essential business functions must return to full operation Selected Answer: bu sin ess im pa ct an aly sis (BI A) Correct Answer: business impact analysis (BIA) - Question 37 What is the difference between a BCP and a DRP? Selected Answer: A DRP directs the actions necessary to recover resources after a disaster.
Ans wer: (^) Full- interruption
- Question 41 0 out of 1 points What name is given to an access control method that bases access control approvals on the jobs the user is assigned? Selected Answer: reference monitor Correct Answer: role-based access control (RBAC) - Question 42 0 out of 1 points Which of the following is an accurate description of cloud computing? Selected Answer: The process of providing credentials to claim to be a specific person or entity. Correct Answer: The practice of using computing services that are delivered over a network. - Question 43 A communication protocol that is connectionless and is popular for exchanging small amounts of data or messages is called. Selected Answer: User Datagram Protocol (UDP) 1 out of 1 points Correct Answer: User Datagram Protocol (UDP) - Question 44 is used to describe a property that indicates that a specific 1 out of 1 points
subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object’s classification. Selected Answer: Need- to- know Correct Answer: Need- to- know
- Question 45 1 out of 1 points A method of restricting resource access to specific periods of time is called . Selected Answer: temporal isolation Correct Answer: temporal isolation - Question 46 0 out of 1 points Temporal isolation restricts access to specific and is often used in combination with role-based access control. Selec ted Answer: peop le Correct Answer: time s - Question 47 A mechanism that limits access to computer systems and network resources is , Selected Answer: logical access control
Correct Answer: voice pattern
- Question 50 The is the central part of a computing environment’s hardware, software, and firmware that enforces access control for computer systems. Selected Answer: security kernel 1 out of 1 points Correct Answer: security kernel - Question 51 1 out of 1 points are the benchmarks that help make sure a minimum level of security exists across multiple applications of systems and across different products. Selected Answer: (^) Baselin es Correct Answer: (^) Baselin es - Question 52 0 out of 1 points Selected Answer: teaching employees about security objectives
Correct Answer: all of the above
- Question 53 What is meant by standard? Selected Answer: A benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products. 0 out of 1 points Correct Answer: A mandated requirement for a hardware or software solution that is used to deal with a security risk throughout the organization. - Question 54 0 out of 1 points The primary task of an organization’s team is to control access to systems or resources. Selected Answer: compliance liaison Correct Answer: security administration - Question 55 1 out of 1 points The team’s responsibilities include handling events that affect your computers and networks and ultimately can respond rapidly and effectively to any event. Selected Answer: security administration