
Quiz SIA2 Chapter 11
Authored by Gerald Galeno
Education
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
There is 5 principles that jointly contribute to system reliability, which one is the system and its information are available to meet operational and contractual obligation
Security
Privacy
Availability
Confidentiality
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The time-based model of information security can be expressed in the following formula: P > D + R , what is the symbol P?
The time it takes an attacker to break through the various controls that protect the organization’s information assets.
The time it takes for the organization to detect that an attack is in progress
The time it takes to respond to and stop the attack
The time needed to develop the company.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one is a physical or behavioral characteristic used as an authentication credential??
Defense In Depth
Authentication
Biometric Identifier
Multifactor Authentication
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Routers and firewalls control access by filtering individual packets. Organizations own one or more border routers that connect their internal networks to the Internet Service Provider. Those border routers and the organization’s main firewall use sets of IF-THEN rules, called?
Compability Test
Access Control Lists
Demilitarized Zone
Access Control Matrix
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the specific purpose of the Router?
A. To control traffic, rather than looking only at the information in the IP and TCP headers.
A. To determine what to do with arriving packets.
A. To determine whether that employee should be allowed to access that resource and perform the requested action.
A. To read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not a basic step criminals follow to attack information systems?
Find known vulnerabilities
Infect the victim’s network with a virus
Identify potential points of remote entry
Learn as musch as possible about the target and its vulnerabilities
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Systems that create logs of all network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions is
A. Intrusion Prevention Systems
B. Computer Incident Response
C. Response Penetration Test
D. Intrusion Detection Systems
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?