Search Header Logo

Prem Slide Review 2.0

Authored by Prem Jadhwani

Computers

Professional Development

Used 6+ times

Prem Slide Review 2.0
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An option in MDM software that allows a company to remove corporate data from an employees personal device in case the device is lost or stolen.

Data Cleansing

Mobile Device Control Manager

Personal Device Data Removal (PDDR)

Remote Wipe

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This security measure enhances the security and integrity of a software system by preventing malicious or erroneous data being inserted into user input fields from causing unexpected behavior or vulnerabilities

Parameterized Queries

Web Application Firewall

Security and Integration Software

Input Validation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of adding geospatial metadata to various media types for geographical identification.

GPS

GeoTagging

GeoFencing

GeoPolitical Situation

4.

MATCH QUESTION

1 min • 1 pt

Match the following

Risk Detection

The company performs regular audits to determine if violations have occurred.

Risk Reduction

The company implements a policy to train users on a more secure method of operation.

Risk Transference

The Chief Information Officer decides to sign off on the risk.

Risk Acceptance

A company purchases insurance and is no longer worried about losses from data breaches.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A situation where a person or object is observed or recorded in two different locations in a time frame that would make the journey between those locations physically impossible.

Impossible Travel Time

GeoTagging

GeoFencing

Geographic Position Analysis (GPA)

Answer explanation


"Impossible travel time" generally refers to a situation where a person or object is observed or recorded in two different locations in a time frame that would make the journey between those locations physically impossible. This term is often used in the context of security monitoring, surveillance, or tracking systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A configuration in which two (or more) systems or nodes work together to ensure continuous operation and minimize downtime. The direct key to avoiding single points of failure.

SPOF Prevention System

Low Availability Pair

High Availability Pair

Dual Machine Redundancy

Answer explanation

A high availability (HA) pair, also known as a high availability cluster or failover cluster, is a configuration in which two (or more) systems or nodes work together to ensure continuous operation and minimize downtime. The purpose of an HA pair is to provide redundancy and fault tolerance, ensuring that if one system fails or experiences issues, the other can take over seamlessly, thereby maintaining availability of services.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Changing or copying a systems MAC address to another MAC address.

MAC Splitting

MAC Mirroring

MAC Cloning

MAC Separation

Answer explanation


MAC cloning, or MAC address cloning, refers to the practice of changing or copying the Media Access Control (MAC) address of a network interface card (NIC) on a networked device. The MAC address is a unique identifier assigned to a network interface for communication on a network. It is hard-coded into the hardware of the network interface and is used at the data link layer (Layer 2) of the OSI model.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?