IIS 4

IIS 4

University

78 Qs

quiz-placeholder

Similar activities

Cardiac Anatomy & Physiology

Cardiac Anatomy & Physiology

University

75 Qs

Unit 5 Review

Unit 5 Review

6th Grade - University

80 Qs

ระบบกระดูก

ระบบกระดูก

University

74 Qs

Chemistry Review Honors

Chemistry Review Honors

8th Grade - University

75 Qs

Basic Medical Science II

Basic Medical Science II

University

80 Qs

NEWTON'S LAW OF MOTION

NEWTON'S LAW OF MOTION

11th Grade - University

83 Qs

Microbiological Culture and Testing

Microbiological Culture and Testing

11th Grade - University

80 Qs

IIS 4

IIS 4

Assessment

Quiz

Science

University

Practice Problem

Hard

Created by

Hiền Đào

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

78 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to the work product satisfying the real-world requirements and concepts? Select one:

concurrence

verification

validation

accuracy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an advantage of a qualitative over quantitative risk analysis? Select one:

It makes cost-benefit analysis of recommended controls easier.

It prioritizes the risks and identifies areas for immediate improvement in addressing the vulnerabilities.

It provides specific quantifiable measurements of the magnitude of the impacts.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents the amount of time you hold down in a particular key? Select one:

Dynamic time

Flight time

Dwell time

Systems time

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an effective measure against a certain type of brute force password attack? Select one:

Password history is used.

Password used must not be a word found in a dictionary.

Password reuse is not allowed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following questions is less likely to help in assessing controls over hardware and software maintenance? Select one:

Are system components tested, documented, and approved prior to promotion to production?

Is access to all program libraries restricted and controlled?

Are integrity verification programs used by applications to look for evidences of data tampering, errors, and omissions?

Is there version control?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They in form of credit card-size memory cards or smart cards, or those resembling small calculators, are used to supply static and dynamic passwords are called:

Tickets

Coupons

Token passing networks

Tokens

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an Ethernet LAN in a bus topology have a greater risk of unauthorized disclosure than switched Ethernet in a hub-and-spoke or star topology?

Ethernet is a broadcast technology.

TCP/IP is an insecure protocol.

Hub and spoke connections are highly multiplexed.

IEEE 802.5 protocol for Ethernet cannot support encryption.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?