Вы находитесь на странице: 1из 7

Question 1

Complete
1.00 points out of 1.00

Flag question

Question text

In addition to “What users know,” “What users have,” and “what users are,” what did the author
add to be able to authenticate a user?
Select one:
a. “What users should have”
b. “What users should think”
c. “What users can argue they should be”
d. “What users do”

Question 2
Complete
1.00 points out of 1.00

Flag question

Question text

Preventing physical access to a server by an unauthorized individual is the


Select one:
a. Responsibility of the Intrusion Detection System
b. Primary security concern for a system administrator
c. An organization’s least important concern
d. Reason we implement firewalls

Question 3
Complete
1.00 points out of 1.00

Flag question

Question text

A hub operates at
Select one:
a. Layer 1, the physical layer
b. Layer 2, the data link layer
c. Layer 2, the MAC layer
d. Layer 3, the network layer

Question 4
Complete
1.00 points out of 1.00

Flag question

Question text

_____ is the process by which each end of the data flow proves that they are who they say they
are.
Select one:
a. Integrity
b. Confidentiality
c. Authentication
d. WTLS

Question 5
Complete
1.00 points out of 1.00

Flag question

Question text

A(n) ____ is a network device that can be hardware, software, or a combination of both whose
purpose is to enforce a security policy across its connections to external networks such as the
Internet
Select one:
a. Blister pack
b. Switch
c. Server
d. Firewall

Question 6
Complete
1.00 points out of 1.00

Flag question

Question text

You are building a small network in the office. You will need to connect two different network
segments that have different network addresses. What device will you use to connect them?
Select one:
a. Hub
b. Router
c. Switch
d. Server

Question 7
Complete
1.00 points out of 1.00

Flag question

Question text

Which of the following describes the wireless standard?


Select one:
a. 802.11
b. 854.12
c. 800.15
d. 756.10

Question 8
Complete
1.00 points out of 1.00

Flag question

Question text

Which of the following protocols was designed for short-range wireless communication typically
with mobile phones?
Select one:
a. WPA2
b. Bluetooth
c. WEP
d. 802.11n

Question 9
Complete
1.00 points out of 1.00

Flag question

Question text

You are building a network and need to connect five computers in an office. They will be on the
same network segment and you should be able to perform some security functions such as port
address security. What device would you use to connect the computers?
Select one:
a. Switch
b. Hub
c. Router
d. Server

Question 10
Complete
1.00 points out of 1.00

Flag question

Question text

What does AAA stand for?


Select one:
a. Awareness, Accounting, Available
b. Acceptable, Available, Activities
c. Awareness, Accounting, Archiving
d. Authentication, Authorization, Accounting

Question 11
Complete
1.00 points out of 1.00
Flag question

Question text

When an attacker uses Bluetooth to copy emails, contact lists, or other files on the device, it is
called
Select one:
a. Bluejacking
b. Bluesnarfing
c. Bluebugging
d. Bluehacking

Question 12
Complete
1.00 points out of 1.00

Flag question

Question text

What does SSH stand for?


Select one:
a. Simple Security Hardware
b. Secure Socket Help
c. Secure Shell
d. Secure Hard Drive

Question 13
Complete
1.00 points out of 1.00

Flag question

Question text

What is wireless networking?


Select one:
a. The transmission of packetized data by means of fiber optic cable
b. The transmission of packetized data via the internet
c. The transmission of packetized data by means of physical topology not using direct physical
links
d. The transmission of packetized data by means of private bands

Question 14
Complete
1.00 points out of 1.00

Flag question

Question text

Your boss wants you to suggest a secure way to connect to the corporate network from
home. You will have to connect through the Internet. What is a possible solution?
Select one:
a. Telnet
b. FTP
c. VPN
d. rsh

Question 15
Complete
1.00 points out of 1.00

Flag question

Question text

_____ is when an attacker uses Bluetooth to establish a connection to a device allowing success
to the full AT command set.
Select one:
a. Bluejacking
b. Bluesnarfing
c. Bluebugging
d. Bluehacking
Finish review
◄ Week 4 Discussion Question
Jump to...

Вам также может понравиться