Quiz SIA2 Chapter 11

Quiz SIA2 Chapter 11

University

10 Qs

quiz-placeholder

Similar activities

FSM3001 Global Food & Malaysia

FSM3001 Global Food & Malaysia

University

10 Qs

Nursing Management Process - Staffing

Nursing Management Process - Staffing

University

8 Qs

Total Quality Management (TQM)

Total Quality Management (TQM)

University

10 Qs

Quiz 1_LIS 309

Quiz 1_LIS 309

University

15 Qs

GIS Fundamentals

GIS Fundamentals

University

12 Qs

How Well Do You Know Your Library

How Well Do You Know Your Library

University

10 Qs

Chapter 2: Gathering Network Requirement

Chapter 2: Gathering Network Requirement

University

10 Qs

ADMIN CHAP 8&9

ADMIN CHAP 8&9

University

12 Qs

Quiz SIA2 Chapter 11

Quiz SIA2 Chapter 11

Assessment

Quiz

Education

University

Medium

Created by

Gerald Galeno

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

There is 5 principles that jointly contribute to system reliability, which one is the system and its information are available to meet operational and contractual obligation

Security

Privacy

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The time-based model of information security can be expressed in the following formula: P > D + R , what is the symbol P?

The time it takes an attacker to break through the various controls that protect the organization’s information assets.

The time it takes for the organization to detect that an attack is in progress

The time it takes to respond to and stop the attack

The time needed to develop the company.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a physical or behavioral characteristic used as an authentication credential??

Defense In Depth

Authentication

Biometric Identifier

Multifactor Authentication

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Routers and firewalls control access by filtering individual packets. Organizations own one or more border routers that connect their internal networks to the Internet Service Provider. Those border routers and the organization’s main firewall use sets of IF-THEN rules, called?

Compability Test

Access Control Lists

Demilitarized Zone

Access Control Matrix

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the specific purpose of the Router?

A.      To control traffic, rather than looking only at the information in the IP and TCP headers.

A.      To determine what to do with arriving packets.

A.      To determine whether that employee should be allowed to access that resource and perform the requested action.

A.      To read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is not a basic step criminals follow to attack information systems?

Find known vulnerabilities

Infect the victim’s network with a virus

Identify potential points of remote entry

Learn as musch as possible about the target and its vulnerabilities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Systems that create logs of all network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions is

A. Intrusion Prevention Systems

B. Computer Incident Response

C. Response Penetration Test

D. Intrusion Detection Systems

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?