
IAS1-Assessment Test (BSIT3102)
Quiz
•
Instructional Technology
•
Professional Development
•
Practice Problem
•
Hard
Ardi Moran
Used 2+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organization that Chris works for has disabled automatic updates. What is the most common reason for disabling automatic updates for organizational systems?
To avoid disruption of the work process for office workers
To prevent security breaches due to malicious patches and updates
To avoid issues with problematic patches and updates
All of the above
Answer explanation
The most common reason to disable automatic patching is to avoid issues with problematic or flawed patches and updates. In most environments the need to patch regularly is accepted and handled for office workers without causing significant disruption. That concern would be different if the systems being patched were part of an industrial process or factory production environment. Malicious patches from legitimate sources such as an automatic update repository are exceptionally rare and are not a common concern or driver of this behavior. For more information, see Chapter 11 .
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the least volatile according to the forensic order of volatility?
The system's routing table
Logs
Temp files
CPU registers
Answer explanation
Logs, along with any file that is stored on disk without the intention of being frequently overwritten, are the least volatile item listed. In order from most volatile to least from the answers here, you could list these as CPU registers, the system's routing table, temp files, and logs. For more information, see Chapter 15 .
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ed wants to trick a user into connecting to his evil twin access point (AP). What type of attack should he conduct to increase his chances of the user connecting to it?
A disassociation attack
An application denial-of-service attack
A known plain-text attack
A network denial-of-service attack
Answer explanation
If Ed can cause his target to disassociate from the access point they are currently connected to, he can use a higher transmission power or closer access point to appear higher in the list of access points. If he is successful at fooling the user or system into connecting to his AP, he can then conduct on-path attacks or attempt other exploits. Denial-of-service attacks are unlikely to cause a system to associate with another AP, and a known plain text attack is a type of cryptographic attack and is not useful for this type of attempt. For more information, see Chapter 12 .
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe wireless site surveys that show the relative power of access points on a diagram of the building or facility?
Signal surveys
db maps
AP topologies
Heatmaps
Answer explanation
Site surveys that show relative power on a map or diagram are called heatmaps. They can help show where access points provide a strong signal, and where multiple APs may be competing with each other due to channel overlap or other issues. They can also help identify dead zones where signal does not reach. Signal surveys, db maps, and AP topologies were made up for this question. For more information, see Chapter 13 .
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What hardware device is used to create the hardware root of trust for modern desktops and laptops?
System memory
A HSM
The CPU
The TPM
Answer explanation
A hardware root of trust provides a unique element that means that a board or device cannot be replicated. A Trusted Platform Module (TPM) is commonly used to provide the hardware root of trust. CPUs and system memory are not unique in this way for common desktops and laptops, and a hardware security module (HSM) is used to create, manage, and store cryptographic certificates as well as perform and offload cryptographic operations. For more information, see Chapter 11 .
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Angela wants to prevent users in her organization from changing their passwords repeatedly after they have been changed so that they cannot reuse their current password. What two password security settings does she need to implement to make this occur?
Set a password history and a minimum password age.
Set a password history and a complexity setting.
Set a password minimum and maximum age.
Set password complexity and maximum age
Answer explanation
Angela needs to retain a password history and set a minimum password age so that users cannot simply reset their password until they have changed the password enough times to bypass the history. For more information, see Chapter 8 .
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Chris wants to establish a backup site that is fully ready to take over for full operations for his organization at any time. What type of site should he set up?
A cold site
A clone site
A hot site
A ready site
Answer explanation
Hot sites are ready to take over operations in real time. Cold sites are typically simply ready buildings with basic infrastructure
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Computadoras
Quiz
•
KG - Professional Dev...
15 questions
Revisão Programação Web - 2
Quiz
•
10th Grade - Professi...
20 questions
BCS Systems & Architecture Quiz 1
Quiz
•
University - Professi...
21 questions
Konde technology quiz - Do you know your educational Apps?
Quiz
•
Professional Development
16 questions
CPA CPF1 System Specifications
Quiz
•
8th Grade - Professio...
15 questions
Security Awareness Vol.4
Quiz
•
Professional Development
18 questions
COMPETENTE DIGITALE
Quiz
•
Professional Development
16 questions
AI-900 - Fundamentals - Simulado 04
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Instructional Technology
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Christmas Movies
Quiz
•
Professional Development
20 questions
Christmas Trivia
Quiz
•
Professional Development
15 questions
Fun Holiday Trivia
Quiz
•
Professional Development
25 questions
Name That Tune - Christmas
Quiz
•
Professional Development
29 questions
Christmas Song Emoji Pictionary
Quiz
•
Professional Development
9 questions
Holiday Movie Trivia
Lesson
•
Professional Development
34 questions
Winter Trivia
Quiz
•
Professional Development
