Skip to main content

IS5403 Week 4 All Quizw



4
Question

Both DNS poisoning and ARP poisoning involves:

Correct
 
4 of 7
5
Question

Which of the following statements are true about client-side DNS? (Choose all that apply).

Correct
 
5 of 7
6
Question

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The server has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?

Correct
 
6 of 7
7
Question

Which command is used in testing and troubleshooting DNS servers?

Correct
4
Question

Which of the following are available protocols for security purposes? (Choose all that apply.)

Correct
 
4 of 6
5
Question

Which of the following services only requires a single port be opened on the firewall?

Correct
 
5 of 6
6
Question

SNMP uses which port by default?

Correct
4
Question

To make a firewall effective you need to define/edit _______________

Correct
 
4 of 6
5
Question

Which of the following network profiles is available on Windows Firewall?

Correct
 
5 of 6
6
Question

What happens when you execute the following command:

netsh advfirewall set allprofiles state off

Correct
Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?
CORRECT
Which of the following is NOT a service model in cloud computing?
CORRECT
Which of these is the most secure protocol for transferring files?
CORRECT
DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission.
CORRECT


Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?
CORRECT
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
CORRECT
Which of the following is NOT a security concern of virtualized environments?
CORRECT
Which of the following can be used to prevent a buffer overflow attack?
CORRECT

Which of these is NOT correct about an SSL/TLS accelerator?

CORRECT
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
CORRECT
Which type of device log contains the most beneficial security data?
CORRECT
Which of the following TCP/IP protocols do not relate to security?
CORRECT
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
CORRECT
Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?
CORRECT
Which type of hypervisor does not run on an underlying operating system?
CORRECT
What functions of a switch does a software defined network separate?
CORRECT
Which type of cloud is offered to specific organizations that have common concerns?
CORRECT
Which application stores the user's desktop inside a virtual machine that resides on a server and is accessible from multiple locations?
CORRECT

Which type of log can provide details regarding requests for specific files on a system?

CORRECT
What is the recommended secure protocol for voice and video applications?
CORRECT
The primary design of a(n) _____ is to capture the transmissions from legitimate users.
CORRECT
What is the primary weakness of wired equivalent privacy (WEP)?
CORRECT
Which of these is a vulnerability of MAC address filtering?
CORRECT
Why is a rogue AP a security vulnerability?
CORRECT
Which technology is predominately used for contactless payment systems?
CORRECT
Which of these is NOT a type of wireless AP probe?
CORRECT
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
CORRECT
Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?
CORRECT

Which of the following is NOT true of a wireless router?

CORRECT
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
CORRECT
Which of these is NOT a risk when a home wireless router is not securely configured?
CORRECT
Which of these is NOT a limitation of turning off the SSID broadcast from an AP?
CORRECT
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
CORRECT
What is a difference between NFC and RFID?
CORRECT
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?
CORRECT

WPA replaces WEP with _____.
CORRECT
A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?
CORRECT
Which of the following is NOT a wireless peripheral protection option?
CORRECT
AES-CCMP is the encryption protocol standard used in _____.
CORRECT
Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?
CORRECT












































































































































































































































 

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh