Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Review Test Submission: Week 11 Certification Readiness Post-Assessment Exam, Exams of Nursing

⦁ Question 2 1 out of 1 points The goal and objective of a is to provide a consistent definition for how an organization should handle and secure different types of data. Selected Answer: data classification standard Correct Answer: data classification standard

Typology: Exams

2023/2024

Available from 08/12/2023

Briantaller
Briantaller 🇺🇸

162 documents

1 / 48

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Review Test Submission: Week 11
Certification
Readiness
Post-Assessment
Exam
Question 1
1 out of 1 points
The world needs people who understand computer-systems and who can
protect computers and networks from criminals and
terrorists.
Select
ed Answer:
securi
ty
Correct
Answe
r: securi
ty
Question 2
1 out of 1 points
The goal and objective of a is to provide a
consistent definition for how an organization should handle
and secure different types of data.
Selected
Answer: data classification
standard
Correct
Answer: data classification
standard
Question 3
1 out of 1 points
Today, people working in cyberspace must deal with new
and constantly evolving .
Select
ed Answer:
threa
ts
Correct Answer:
threa
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30

Partial preview of the text

Download Review Test Submission: Week 11 Certification Readiness Post-Assessment Exam and more Exams Nursing in PDF only on Docsity!

Review Test Submission: Week 11

Certification Readiness Post-Assessment

Exam

- Question 1 1 out of 1 points The world needs people who understand computer-systems and who can protect computers and networks from criminals and terrorists. Select ed Answer: securi ty Correct Answe r: (^) securi ty - Question 2 1 out of 1 points The goal and objective of a is to provide a consistent definition for how an organization should handle and secure different types of data. Selected Answer: data classification standard Correct Answer: data classification standard - Question 3 1 out of 1 points Today, people working in cyberspace must deal with new and constantly evolving. Select ed Answer: threa ts Correct Answer: threa

ts

- Question 4 The Domain connects remote users to the organization’s IT infrastructure. 1 out of 1 points Answer: Remote Access Correct Answer: Remote Access - Question 5 What term is used to describe the amount of time that an IT system, application, or data is not available to users? Selected Answer: connectiv ity 0 out of 1 points Correct Answer: (^) downtim e - Question 6 The act of transforming cleartext data into undecipherable ciphertext is the definition of. Selected Answer: encrypti on

visible and not decipherable. 1 out of 1 points Correct Answer: The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable.

- Question 10 1 out of 1 points Which of the following describes the Family Educational Rights and Privacy Act (FERPA)? Selected Answer: A U.S. federal law that protects the private data of students, including their transcripts and grades, with which K–12 and higher- education institutions must comply. Correct Answer: A U.S. federal law that protects the private data of students, including their transcripts and grades, with which K–12 and higher- education institutions must comply. - Question 11 1 out of 1 points As users upgrade LANs to GigE or 10GigE, switches must support and data IP traffic. Sele cted Ans wer: (^) voic e Corr ect Ans wer: (^) voic e

- Question 12 1 out of 1 points The total number of errors divided by the total number of bits transmitted is the definition of. Answer: bit error rate Correct Answer: bit error rate - Question 13 What is meant by application convergence? Selected Answer: A basic digital signaling rate that corresponds to one voice- frequency-equivalent channel. Although the true data rate for 0 out of 1 points Correct DS 0 is 64 kbit/s, the effective data rate for a single voice channel when using DS0 is 56 kbit/s. Answer: The integration of applications to enhance productivity. Unified communications is an example of application convergence. Unified communications integrates recorded voice messages into e-mail so that voice messages are retrievable via e-mail. - Question 14 What name is given to a software-based application like WebEx that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real-time discussions with team members or colleagues? Selected Answer: call-detail recording

Selected Answer: den ial of ser vic e (Do S) Correct Answer: bit error rate

- Question 17 What is meant by call control? Selected Answer: A password or personal identification number (PIN) used on phone systems to provide authenticated access to a dial tone. Users have to enter a unique authorization code to make long- distance or toll calls from the organization’s phone system. 0 out of 1 points Correct Answer: The software in a phone system that performs the call switching from an inbound trunk to a phone extension. - Question 18 What is meant by digital subscriber line ( DSL )? Selected Answer: A high-speed digital broadband service that uses copper cabling for Internet access. 1 out of 1 points Correct Answer: A high-speed digital broadband service that uses copper cabling for Internet access. - Question 19 is a technique where multiple light streams can transmit data

through a single strand of fiber. Selected Answer: Dense^ wavelength^ division^ multiplexing (DWDM) 1 out of 1 points Correct Answer: Dense wavelength division multiplexing (DWDM)

- Question 20 1 out of 1 points the ability to provide access to the necessary information without having to invest in many computers and network infrastructure. Selecte d Answer: mobile devices Correct Answer: mobile devices - Question 21 Which of the following is the definition of netcat? Selected Answer: An^ e-mail^ or^ instant-message^ spoofing^ fraud^ attempt^ that 0 out of 1 points targets a specific organization, seeking unauthorized access to confidential data.

Correct Answer: all of the above

- Question 25 A is a tool used to scan IP host devices for open ports that have been enabled. Selected Answer: (^) port scanner

  • out of 1 points Correct Answer:^ port scanner - Question 26 1 out of 1 points is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of them. Selecte d Answer: Hijacki ng Correct Answer: Hijacki ng - Question 27 In a , the attacker sends a large number of packets requesting connections to the victim computer. Selected Answer: (^) SYN flood

1 out of 1 points Correct Answer: (^) SYN flood

- Question 28 A software program that collects information about Internet usage and 1 out of 1 points . Select ed Answer: adwa re Correct Answer: adwa re - Question 29 What term is used to describe an attack in which the attacker gets 1 out of 1 points between two parties and intercepts messages before transferring them on to their intended destination? Selected Answer: man- in- the- middl e attac

- Question 33 How often should an organization perform a risk management plan? Selected Answer: annual ly 1 out of 1 points Correct Answer: annual ly - Question 34 What is the Project Management Body of Knowledge (PMBOK)? Selected 1 out of 1 points Answer: A collection of the knowledge and best practices of the project management profession. Correct Answer: A collection of the knowledge and best practices of the project management profession. - Question 35 is rapidly becoming an increasingly important aspect of enterprise computing. Selected Answer: Disaster recovery 1 out of 1 points Correct Answer: Disaster recovery

- Question 36 A will help identify not only which functions are critical, but 1 out of 1 points also how quickly essential business functions must return to full operation Selected Answer: bu sin ess im pa ct an aly sis (BI A) Correct Answer: business impact analysis (BIA) - Question 37 What is the difference between a BCP and a DRP? Selected Answer: A DRP directs the actions necessary to recover resources after a disaster.

  • out of 1 points Correct Answer: All of the above. - Question 38

Ans wer: (^) Full- interruption

- Question 41 0 out of 1 points What name is given to an access control method that bases access control approvals on the jobs the user is assigned? Selected Answer: reference monitor Correct Answer: role-based access control (RBAC) - Question 42 0 out of 1 points Which of the following is an accurate description of cloud computing? Selected Answer: The process of providing credentials to claim to be a specific person or entity. Correct Answer: The practice of using computing services that are delivered over a network. - Question 43 A communication protocol that is connectionless and is popular for exchanging small amounts of data or messages is called. Selected Answer: User Datagram Protocol (UDP) 1 out of 1 points Correct Answer: User Datagram Protocol (UDP) - Question 44 is used to describe a property that indicates that a specific 1 out of 1 points

subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object’s classification. Selected Answer: Need- to- know Correct Answer: Need- to- know

- Question 45 1 out of 1 points A method of restricting resource access to specific periods of time is called . Selected Answer: temporal isolation Correct Answer: temporal isolation - Question 46 0 out of 1 points Temporal isolation restricts access to specific and is often used in combination with role-based access control. Selec ted Answer: peop le Correct Answer: time s - Question 47 A mechanism that limits access to computer systems and network resources is , Selected Answer: logical access control

Correct Answer: voice pattern

- Question 50 The is the central part of a computing environment’s hardware, software, and firmware that enforces access control for computer systems. Selected Answer: security kernel 1 out of 1 points Correct Answer: security kernel - Question 51 1 out of 1 points are the benchmarks that help make sure a minimum level of security exists across multiple applications of systems and across different products. Selected Answer: (^) Baselin es Correct Answer: (^) Baselin es - Question 52 0 out of 1 points Selected Answer: teaching employees about security objectives

Correct Answer: all of the above

- Question 53 What is meant by standard? Selected Answer: A benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products. 0 out of 1 points Correct Answer: A mandated requirement for a hardware or software solution that is used to deal with a security risk throughout the organization. - Question 54 0 out of 1 points The primary task of an organization’s team is to control access to systems or resources. Selected Answer: compliance liaison Correct Answer: security administration - Question 55 1 out of 1 points The team’s responsibilities include handling events that affect your computers and networks and ultimately can respond rapidly and effectively to any event. Selected Answer: security administration