Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Week 1 Certification Readiness Pre-Assessment Exam Questions With Answers, Exams of Computer Science

A set of 51 multiple-choice questions and answers related to information security and networking. The questions cover topics such as data classification, encryption, disaster recovery, intrusion detection, VoIP, DSL, ATM, e-commerce, packet sniffers, malware, attacks, risk management, access control, security administration, and configuration management. The document also provides the score and time elapsed for a self-test exam. The questions and answers can be used as study notes or exam preparation material for courses related to information security and networking.

Typology: Exams

2022/2023

Available from 12/16/2023

wilfred-hill
wilfred-hill 🇺🇸

3.8

(4)

1.8K documents

1 / 66

Toggle sidebar

Related documents


Partial preview of the text

Download Week 1 Certification Readiness Pre-Assessment Exam Questions With Answers and more Exams Computer Science in PDF only on Docsity!

Week 1 Certification Readiness Pre-

Assessment Exam Questions With

Answers Download To Pass

Started 10/15/14 4:03 PM Submitted 10/15/14 5:19 PM Status Completed Attempt Score 48 out of 125 points Time Elapsed 1 hour, 16 minutes out of 3 hours and 30 minutes. Instructions Self Test Student answers and score are not visible to the instructor.

- Question 1 The goal and objective of a is to provide a consistent 1 out of 1 points definition for how an organization should handle and secure different types of data. Answer Selected Answer: (^) data classification standard Correct Answer: (^) data classification standard - Question 2 1 out of 1 points The requirement to keep information private or secret is the definition of. Answer Selected Answer: confidenti a lity Correct Answer: confidenti a lity - Question 3 is the proc ess

of transforming data from cleartext into ciphertext. Answer Selected Answer: Encryp ti on 1 out of 1 points Correct Answer: (^) Encrypti

on

- Question 4 Today, people working in cyberspace must deal with new and constantly evolving. Answer Selected Answer: threa ts 1 out of 1 points Correct Answer: threa ts - Question 5 is the practice of hiding data and keeping it away from unauthorized users. Answer Selected Answer: Cryptogr a phy 1 out of 1 points Correct Answer: Cryptogr a phy - Question 6 1 out of 1 points With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a. Answer Selected Answer: (^) wireless access point (WAP) Correct Answer: (^) wireless access point (WAP) - Question 7 The is where the fourth layer of defense is required. Answer Selec ted Answer: L A N

to-WAN Domain 1 out of 1 points

Correct Answer: (^) LAN-to- WAN Domain

- Question 8 A defines how a business gets back on its feet after a major disaster like a fire or hurricane. Answer Selected Answer: (^) disaster recovery plan (DRP) 1 out of 1 points Correct Answer: (^) disaster recovery plan (DRP ) - Question 9 1 out of 1 points This security appliance examines IP data streams for common attack and malicious intent patterns. Answer Selected Answer: (^) intrusion detection system (IDS) Correct Answer: (^) intrusion detection system (IDS) - Question 10 is the duty of every government that wants to ensure its national security. Answer Selected Answer: Cyberse cu rity 1 out of 1 points Correct Answer: Cyberse cu rity - Question 11 1 out of 1 points Network devices can implement to better support VoIP and SIP IP packets and reduce dropped calls and delays.

Answer

Selected Answer: traffic prioritization Correct Answer: traffic prioritization

- Question 12 What is meant by digital subscriber line ( DSL )? Answer Selected Answer: (^) A high-speed digital broadband service that uses copper cabling for Internet access. 1 out of 1 points Correct Answer: (^) A high-speed digital broadband service that uses copper cabling for Internet access. - Question 13 The total number of errors divided by the total number of bits transmitted is the definition of. Answer Selected Answer: bit error rate 1 out of 1 points Correct Answer: bit error rate - Question 14^1 out^ of^1 points What term is used to describe a strategy that uses a device to provide electrical power for IP phones from the RJ-45 8-pin jacks directly to the workstation outlet? Answer Selected Answer: (^) power over Ethernet (PoE) Correct Answer: (^) power over Ethernet (PoE) - Question 15

1 out of 1 points

Medical practices and hospitals realized early on that provide(s) the ability to provide access to the necessary information without having to invest in many computers and network infrastructure. Answer Selected Answer: mobile devices Correct Answer: mobile devices

- Question 16 1 out of 1 points An encrypted channel used for remote access to a server or system, commonly used in Linux and UNIX servers and applications, is the definition of. Answer Selected Answer: (^) secure shell (SSH) Correct Answer: (^) secure shell (SSH) - Question 17 As users upgrade LANs to GigE or 10GigE, switches must support and data IP traffic. Answer Selected Answer: voic e 1 out of 1 points Correct Answer: voic e - Question 18 Wh at is me ant by call

control? Answer Selected Answer: (^) A password or personal identification number (PIN) used on phone systems to provide authenticated access to a dial tone. Users have to enter a unique authorization code to 0 out of 1 points

Correc t make long-distance or toll calls from the organization’s phone system. Answer: (^) The software in a phone system that performs the call switching from an inbound trunk to a phone extension.

- Question 19 What name is given to a high-speed broadband networking 0 out of 1 points technology that uses a 53-byte cell to support real-time voice, video, or data communications? Answer Selecte d Answer : Correct [None Given] Answer: (^) asynchronous transfer mode (ATM) - Question 20 E-commerce systems and applications demand strict C-I-A. Answer Selected Answer: security controls 1 out of 1 points Correct Answer: security control s - Question 21 1 out of 1 points A protocol analyzer or is a software program that enables a computer to monitor and capture network traffic. Answer Selected Answer: packet sniffer Correct Answer:

packet sniffer

- Question 22 Malicious software can be hidden in a. Answer 1 out of 1 points

Selected Answer: (^) all of the above Correct Answer: (^) all of the above

- Question 23 A has a hostile intent, possesses sophisticated skills, and 1 out of 1 points may be interested in financial gain. They represent the greatest threat to networks and information resources. Answer Selected Answer: crack er Correct Answer: crack er - Question 24 What is meant by pharming? Answer Selected 0 out of 1 points Answer: (^) The unique knowledge a business possesses that gives it a competitive advantage over similar companies in similar industries. Correct Answer: (^) An attack that seeks to obtain personal or private financial information through domain spoofing. - Question 25 What is meant by firewall? Answer Selected Answer: (^) A type of attack in which the attacker takes control of a 0 out of 1 points Correct

se ss ion between two machines and masquerades as one of them. Answer: (^) A program or dedicated hardware device that inspects network traffic passing through it and denies or permits that traffic based on a set of rules you determine at

configuration.

- Question 26 A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of. Answer Selected Answer: adwa re 1 out of 1 points Correct Answer: adwa re - Question 27 An attempt to exploit a vulnerability of a computer or network component is the definition of. Answer Selected Answer: atta ck 1 out of 1 points Correct Answer: atta ck - Question 28 What term is used to describe an attack in which the attacker gets between two parties and intercepts messages before transferring them on to their intended destination? Answer Selected Answer: (^) man-in-the- middle attack 1 out of 1 points Correct Answer: (^) man-in-the- middle attack - Question 29 is a type of attack in which the attacker takes cont rol of a ses sion bet

ween two machines and masquerades as one of them. Answer 1 out of 1 points

Selected Answer: Hijacki ng Correct Answer: Hijacki ng

- Question 30 1 out of 1 points Black-hat hackers generally poke holes in systems, but do not attempt to disclose they find to the administrators of those systems. Answer Selected Answer: vulnerabil it ies Correct Answer: vulnerabil it ies - Question 31 What name is given to any risk that exists but has a defined response? Answer Selected Answer: residual risk 1 out of 1 points Correct Answer: residual risk - Question 32 A will help identify not only which functions are critical, but also how quickly essential business functions must return to full operation following a major interruption. Ans wer Sele cted Answer: b u s i n

ess impact analysis (BIA) 1 out of 1 points Correct Answer: (^) business impact analysis (BIA)

- Question (^33) 1 out of 1 points What name is given to a comparison of security controls in place and the controls that are needed to address all identified threats? Answer Selected Answer: gap analysis Correct Answer: gap analysis - Question 34 Which of the following best describes quantitative risk analysis? Answer Selected 0 out of 1 points Answer: (^) A risk-analysis method that uses relative ranking to provide further definition of the identified risks in order to determine responses to them. Correct Answer: (^) A risk-analysis method that uses mathematical formulas and numbers to assist in ranking risk severity. - Question 35 is the proportion of value of a particular asset likely to be destroyed by a given risk, expressed as a percentage. Answer Selected Answer: (^) Exposure factor (EF) Correct Answer: (^) Exposure factor (EF) - Question 36 How often should an organization perform a risk management plan? Answer Sel ect ed Answer: w h e n a r i s k

is identified 1 out^ of^1 points 0 out of 1 points Correct Answer: (^) annually

- Question 37 Which of the following is the definition of business drivers? Answer Selected Answer: (^) The collection of components, including people, information, and conditions, that support business objectives. 1 out of 1 points Correct Answer: (^) The collection of components, including people, information, and conditions, that support business objectives. - Question 38 tests interrupt the primary data center and transfer processing capability to an alternate site. Answer Selected Answer: Full- interruption 1 out of 1 points Correct Answer: Full- interruption - Question 39 A is a formal analysis of an organization’s functions and activities that classifies them as critical or noncritical. Answer Selected Answer: (^) business impact analysis (BIA) 1 out of 1 points Correct Answer: (^) business impact analysis (BIA) - Question 40 Your plan shows that you have examined risks to your organization and have developed plans to address each risk. Answ er S e l e c t e d

Answer: risk- response 1 out of 1 points

Correct Answer: risk- response

- Question 41 0 out of 1 points Which of the following adequately defines continuous authentication? Answer Selected Answer: (^) Optional conditions that exist between users and resources. They are permissions granted to an authorized user, such as read, write, and execute. Correct Answer: (^) An authentication method in which a user is authenticated at multiple times or event intervals. - Question 42 What is meant by constrained user interface? Answer Selected Answer: (^) Indicates a change from normal to abnormal behavior. 0 out of 1 points Correct Answer: (^) Software that allows users to enter only specific information. - Question 43 is the process of dividing a task into a series of unique activities performed by different people, each of whom is allowed to execute only one part of the overall task. Answer Selected Answer: (^) Separation of duties 1 out of 1 points Correct Answer: (^) Separation of duties - Question 44 What is meant by multi- tenancy? Answer Selected Answer: 0 out of 1 points

Correc t A property that indicates that a specific subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object’s classification. Answer: (^) A database feature that allows different groups of users to access the database without being able to access each other’s data.

- Question 45 is used to describe a property that indicates that a specific 0 out of 1 points subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object’s classification. Answer Selected Answer: Multi- tenancy Correct Answer: (^) Need- to- know - Question 46 0 out of 1 points What term is used to describe associating actions with users for later reporting and research? Answer Selected Answer: (^) event-based synchronization system Correct Answer: (^) accountability - Question 47 A mechanism that limits access to computer systems and network resources is , Answer Selected Answer: (^) logical access control 1 out of 1 points Correct

Answer: (^) logical access