Skip to main content

IS5403 Week

 Lab 1


CER

Speech recognition

PBKDF2

Cell Phones

Weight


Lab 2


DAC

MAC

RBAC

MAC


Lab 3


Playbook

Isolation

UAC

Administrator password


















3
Question

Which of the following is considered as the root of the Active Directory hierarchy?

Correct
 
3 of 8
4
Question

Which of the following statements describe the function of a Trusted Platform Module (TPM)? [Choose all that apply]

Correct
 
4 of 8
5
Question

Multi-factor authentication involves how many minimum methods to authenticate a user?

Correct
 
5 of 8
6
Question

Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes?

Correct
 
6 of 8
7
Question

Which of the following factor is critical in the Gait analysis?

Correct
3
Action item

Which of the following is required for two-factor authentication? [Choose all that apply]

Correct
 
3 of 8
4
Action item

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Correct
 
4 of 8
5
Action item

Which of the following protocol uses port-based authentication?

Correct
 
5 of 8
6
Action item

How many entities are involved in the 802.1x authentication process?

Correct
 
6 of 8
7
Action item

Which of the following authentication method can use location to authenticate a user?

Correct
1
Question

Which type of incident response team is made up of experts who have other duties?

Correct
 
1 of 8
2
Question

Which of the following refers to a duplicate of the organization’s current data center?

Correct
 
2 of 8
3
Question

Which team is dedicated only to incident response?

Correct
 
3 of 8
4
Question

Which of the following contains all the required hardware and connectivity to restore services?

Correct
 
4 of 8
5
Question

Which of the following provides the plan for systems, networks, and major application recovery after disruptions?

Correct
 
5 of 8
6
Question

Which of the following identifies the individuals to communicate with external entities?

Correct
 
6 of 8
7
Question

Which of the following plan focuses on malware, hackers, intrusions, attacks, and other security issues?

Correct


Which of the following tool would you use to scan a Web application for vulnerabilities?

Correct
 
5 of 10
6
Question

In a Syslog implementation, which of the following component is an agent that collects the information from various devices and servers on the network?

Correct
 
6 of 10
7
Question

Which of the following tasks can be performed by the NXLog tool? [Choose all that apply]

Correct
 
7 of 10
8
Question

In an Email, which of the following are metadata? [Choose all that apply]

Correct
 
8 of 10
9
Question

Which of the following statements describes the core purpose of using Tcpdump?

Correct
1
Question

Which of the following can be considered as Personally identifiable information? [Choose all that apply]

Correct
 
1 of 5
2
Question

Which of the following hashing algorithm is the common standard used for generating digital signatures?

Correct
 
2 of 5
3
Question

How many steps are involved in the forensic investigation process?

Correct
 
3 of 5
4
Question

Which type of evidence collection methods can be used when litigation might be needed? [Choose all that apply]

Correct























































































































































































































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh