Search Header Logo

Quiz SIA2 Chapter 11

Authored by Gerald Galeno

Education

University

Used 2+ times

Quiz SIA2 Chapter 11
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

There is 5 principles that jointly contribute to system reliability, which one is the system and its information are available to meet operational and contractual obligation

Security

Privacy

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The time-based model of information security can be expressed in the following formula: P > D + R , what is the symbol P?

The time it takes an attacker to break through the various controls that protect the organization’s information assets.

The time it takes for the organization to detect that an attack is in progress

The time it takes to respond to and stop the attack

The time needed to develop the company.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a physical or behavioral characteristic used as an authentication credential??

Defense In Depth

Authentication

Biometric Identifier

Multifactor Authentication

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Routers and firewalls control access by filtering individual packets. Organizations own one or more border routers that connect their internal networks to the Internet Service Provider. Those border routers and the organization’s main firewall use sets of IF-THEN rules, called?

Compability Test

Access Control Lists

Demilitarized Zone

Access Control Matrix

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the specific purpose of the Router?

A.      To control traffic, rather than looking only at the information in the IP and TCP headers.

A.      To determine what to do with arriving packets.

A.      To determine whether that employee should be allowed to access that resource and perform the requested action.

A.      To read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is not a basic step criminals follow to attack information systems?

Find known vulnerabilities

Infect the victim’s network with a virus

Identify potential points of remote entry

Learn as musch as possible about the target and its vulnerabilities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Systems that create logs of all network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions is

A. Intrusion Prevention Systems

B. Computer Incident Response

C. Response Penetration Test

D. Intrusion Detection Systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?