Skip to main content

IS5403 Week 5 All Quizezz

2
Question

Which of the following is usually bundled as a hidden component of a freeware?

Correct
 
2 of 6
3
Question

Which of the following are characteristics of spyware? (Choose all that apply.)

Correct
 
3 of 6
4
Question

Flash cookies are a type of spyware. What are ways to clean Flash cookies? (Choose all that apply.)

Correct
 
4 of 6
5
Question

Viruses, botnets, social engineering, and drive-by-downloads and other methods used to attack a target are best described as which of the following?

Correct
 
5 of 6
6
Question

Which of the following is a form of delayed-execution virus?

Correct 


3
Question

Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations?

Correct
 
3 of 8
4
Question

Many botnets were controlled through using what protocol?

Correct
 
4 of 8
5
Question

Which of the following involves deploying a large number of compromised hosts to flood a target system?

Correct
 
5 of 8
6
Question

DoS attacks are for gaining unauthorized access or control of a system.

Correct
 
6 of 8
7
Question

Which of the following MAINLY applies to email that appears to be sent from a legitimate business?

Correct
 
7 of 8
8
Question

An attacker has targeted Corp.com's employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?

Correct
4
Question

Which of the following is NOT a valid physical security measure?

Correct
 
4 of 6
5
Question

Which of the following statement regarding proper patch management is true?

Correct
 
5 of 6
6
Question

Secure Sockets Layer (SSL) is the predecessor of:

Correct
Which model uses a sequential design process?
CORRECT
Which type of residential lock is most often used for keeping out intruders?
CORRECT


A lock that extends a solid metal bar into the door frame for extra security is the _____.
CORRECT
Which of the following is a cumulative package of all patches?
CORRECT
Which stage is a "quality assurance" test that verifies the code functions as intended?
CORRECT
Which of these is a list of approved email senders?
CORRECT
Which statement about a mantrap is true?
CORRECT
Which type of operating system runs on a firewall, router, or switch?
CORRECT
Which of the following is NOT a characteristic of an alarmed carrier PDS?
CORRECT
How can an SDIO card be made secure?
CORRECT
Which of the following is NOT a motion detection method?
CORRECT

Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
CORRECT

How does heuristic detection detect a virus?

INCORRECT
What allows for a single configuration to be set and then deployed to many or all users?
CORRECT
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
CORRECT
Which of the following types of testing uses unexpected or invalid inputs?
CORRECT
Which of the following can be used to secure a laptop or mobile device?
CORRECT
Which of the following is NOT an advantage to an automated patch update service?
CORRECT
Which of the following is NOT a typical OS security configuration?
CORRECT
Which of the following is NOT a memory vulnerability?
CORRECT
Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?
CORRECT
Which tool manages the distribution and control of apps?
CORRECT
What does containerization do?
CORRECT
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?
CORRECT
Which technology is NOT a core feature of a mobile device?
CORRECT
Which of these is considered the strongest type of passcode to use on a mobile device?
CORRECT
Which of the following technologies provides for pictures, video, or audio to be included in text messages?
CORRECT
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security?
CORRECT

What prevents a mobile device from being used until the user enters the correct passcode?
CORRECT
Which type of OS is typically found on an embedded system?
CORRECT
What allows a device to be managed remotely?
CORRECT
Which of these is NOT a risk of connecting a mobile device to a public network?
CORRECT
What enforces the location in which an app can function by tracking the location of the mobile device?
CORRECT
A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?
CORRECT
Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device?
CORRECT
Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?
CORRECT
Which of these is NOT a security feature for locating a lost or stolen mobile device?
CORRECT
Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?
CORRECT
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
CORRECT
What is the process of identifying the geographical location of a mobile device?
CORRECT
























































































































































































































Comments

Popular posts from this blog

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...