Skip to main content

IS5403 Week 5 All Quizezz

2
Question

Which of the following is usually bundled as a hidden component of a freeware?

Correct
 
2 of 6
3
Question

Which of the following are characteristics of spyware? (Choose all that apply.)

Correct
 
3 of 6
4
Question

Flash cookies are a type of spyware. What are ways to clean Flash cookies? (Choose all that apply.)

Correct
 
4 of 6
5
Question

Viruses, botnets, social engineering, and drive-by-downloads and other methods used to attack a target are best described as which of the following?

Correct
 
5 of 6
6
Question

Which of the following is a form of delayed-execution virus?

Correct 


3
Question

Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations?

Correct
 
3 of 8
4
Question

Many botnets were controlled through using what protocol?

Correct
 
4 of 8
5
Question

Which of the following involves deploying a large number of compromised hosts to flood a target system?

Correct
 
5 of 8
6
Question

DoS attacks are for gaining unauthorized access or control of a system.

Correct
 
6 of 8
7
Question

Which of the following MAINLY applies to email that appears to be sent from a legitimate business?

Correct
 
7 of 8
8
Question

An attacker has targeted Corp.com's employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?

Correct
4
Question

Which of the following is NOT a valid physical security measure?

Correct
 
4 of 6
5
Question

Which of the following statement regarding proper patch management is true?

Correct
 
5 of 6
6
Question

Secure Sockets Layer (SSL) is the predecessor of:

Correct
Which model uses a sequential design process?
CORRECT
Which type of residential lock is most often used for keeping out intruders?
CORRECT


A lock that extends a solid metal bar into the door frame for extra security is the _____.
CORRECT
Which of the following is a cumulative package of all patches?
CORRECT
Which stage is a "quality assurance" test that verifies the code functions as intended?
CORRECT
Which of these is a list of approved email senders?
CORRECT
Which statement about a mantrap is true?
CORRECT
Which type of operating system runs on a firewall, router, or switch?
CORRECT
Which of the following is NOT a characteristic of an alarmed carrier PDS?
CORRECT
How can an SDIO card be made secure?
CORRECT
Which of the following is NOT a motion detection method?
CORRECT

Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
CORRECT

How does heuristic detection detect a virus?

INCORRECT
What allows for a single configuration to be set and then deployed to many or all users?
CORRECT
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
CORRECT
Which of the following types of testing uses unexpected or invalid inputs?
CORRECT
Which of the following can be used to secure a laptop or mobile device?
CORRECT
Which of the following is NOT an advantage to an automated patch update service?
CORRECT
Which of the following is NOT a typical OS security configuration?
CORRECT
Which of the following is NOT a memory vulnerability?
CORRECT
Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?
CORRECT
Which tool manages the distribution and control of apps?
CORRECT
What does containerization do?
CORRECT
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?
CORRECT
Which technology is NOT a core feature of a mobile device?
CORRECT
Which of these is considered the strongest type of passcode to use on a mobile device?
CORRECT
Which of the following technologies provides for pictures, video, or audio to be included in text messages?
CORRECT
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security?
CORRECT

What prevents a mobile device from being used until the user enters the correct passcode?
CORRECT
Which type of OS is typically found on an embedded system?
CORRECT
What allows a device to be managed remotely?
CORRECT
Which of these is NOT a risk of connecting a mobile device to a public network?
CORRECT
What enforces the location in which an app can function by tracking the location of the mobile device?
CORRECT
A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?
CORRECT
Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device?
CORRECT
Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?
CORRECT
Which of these is NOT a security feature for locating a lost or stolen mobile device?
CORRECT
Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop?
CORRECT
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
CORRECT
What is the process of identifying the geographical location of a mobile device?
CORRECT
























































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh