IAS1-Assessment Test (BSIT3102)

IAS1-Assessment Test (BSIT3102)

Professional Development

20 Qs

quiz-placeholder

Similar activities

Managing your TBO Account

Managing your TBO Account

Professional Development

15 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

Aerodynamic Lift Yr10 Engineering

Aerodynamic Lift Yr10 Engineering

10th Grade - Professional Development

20 Qs

ITN - Module 16 - Network Security Fundamentals

ITN - Module 16 - Network Security Fundamentals

Professional Development

15 Qs

Online Workshop Yakobus

Online Workshop Yakobus

6th Grade - Professional Development

16 Qs

ISMS Assessment

ISMS Assessment

Professional Development

20 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

IAS1-Assessment Test (BSIT3102)

IAS1-Assessment Test (BSIT3102)

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Ardi Moran

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organization that Chris works for has disabled automatic updates. What is the most common reason for disabling automatic updates for organizational systems?

To avoid disruption of the work process for office workers

To prevent security breaches due to malicious patches and updates

To avoid issues with problematic patches and updates

All of the above

Answer explanation

The most common reason to disable automatic patching is to avoid issues with problematic or flawed patches and updates. In most environments the need to patch regularly is accepted and handled for office workers without causing significant disruption. That concern would be different if the systems being patched were part of an industrial process or factory production environment. Malicious patches from legitimate sources such as an automatic update repository are exceptionally rare and are not a common concern or driver of this behavior. For more information, see Chapter 11 .

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the least volatile according to the forensic order of volatility?

The system's routing table

Logs

Temp files

CPU registers

Answer explanation

Logs, along with any file that is stored on disk without the intention of being frequently overwritten, are the least volatile item listed. In order from most volatile to least from the answers here, you could list these as CPU registers, the system's routing table, temp files, and logs. For more information, see Chapter 15 .

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ed wants to trick a user into connecting to his evil twin access point (AP). What type of attack should he conduct to increase his chances of the user connecting to it?

A disassociation attack

An application denial-of-service attack

A known plain-text attack

A network denial-of-service attack

Answer explanation

If Ed can cause his target to disassociate from the access point they are currently connected to, he can use a higher transmission power or closer access point to appear higher in the list of access points. If he is successful at fooling the user or system into connecting to his AP, he can then conduct on-path attacks or attempt other exploits. Denial-of-service attacks are unlikely to cause a system to associate with another AP, and a known plain text attack is a type of cryptographic attack and is not useful for this type of attempt. For more information, see Chapter 12 .

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe wireless site surveys that show the relative power of access points on a diagram of the building or facility?

Signal surveys

db maps

AP topologies

Heatmaps

Answer explanation

Site surveys that show relative power on a map or diagram are called heatmaps. They can help show where access points provide a strong signal, and where multiple APs may be competing with each other due to channel overlap or other issues. They can also help identify dead zones where signal does not reach. Signal surveys, db maps, and AP topologies were made up for this question. For more information, see Chapter 13 .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What hardware device is used to create the hardware root of trust for modern desktops and laptops?

System memory

A HSM

The CPU

The TPM

Answer explanation

A hardware root of trust provides a unique element that means that a board or device cannot be replicated. A Trusted Platform Module (TPM) is commonly used to provide the hardware root of trust. CPUs and system memory are not unique in this way for common desktops and laptops, and a hardware security module (HSM) is used to create, manage, and store cryptographic certificates as well as perform and offload cryptographic operations. For more information, see Chapter 11 .

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Angela wants to prevent users in her organization from changing their passwords repeatedly after they have been changed so that they cannot reuse their current password. What two password security settings does she need to implement to make this occur?

Set a password history and a minimum password age.

Set a password history and a complexity setting.

Set a password minimum and maximum age.

Set password complexity and maximum age

Answer explanation

Angela needs to retain a password history and set a minimum password age so that users cannot simply reset their password until they have changed the password enough times to bypass the history. For more information, see Chapter 8 .

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Chris wants to establish a backup site that is fully ready to take over for full operations for his organization at any time. What type of site should he set up?

A cold site

A clone site

A hot site

A ready site

Answer explanation

Hot sites are ready to take over operations in real time. Cold sites are typically simply ready buildings with basic infrastructure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?