Skip to main content

IS5403 Week

 Lab 1


CER

Speech recognition

PBKDF2

Cell Phones

Weight


Lab 2


DAC

MAC

RBAC

MAC


Lab 3


Playbook

Isolation

UAC

Administrator password


















3
Question

Which of the following is considered as the root of the Active Directory hierarchy?

Correct
 
3 of 8
4
Question

Which of the following statements describe the function of a Trusted Platform Module (TPM)? [Choose all that apply]

Correct
 
4 of 8
5
Question

Multi-factor authentication involves how many minimum methods to authenticate a user?

Correct
 
5 of 8
6
Question

Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes?

Correct
 
6 of 8
7
Question

Which of the following factor is critical in the Gait analysis?

Correct
3
Action item

Which of the following is required for two-factor authentication? [Choose all that apply]

Correct
 
3 of 8
4
Action item

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Correct
 
4 of 8
5
Action item

Which of the following protocol uses port-based authentication?

Correct
 
5 of 8
6
Action item

How many entities are involved in the 802.1x authentication process?

Correct
 
6 of 8
7
Action item

Which of the following authentication method can use location to authenticate a user?

Correct
1
Question

Which type of incident response team is made up of experts who have other duties?

Correct
 
1 of 8
2
Question

Which of the following refers to a duplicate of the organization’s current data center?

Correct
 
2 of 8
3
Question

Which team is dedicated only to incident response?

Correct
 
3 of 8
4
Question

Which of the following contains all the required hardware and connectivity to restore services?

Correct
 
4 of 8
5
Question

Which of the following provides the plan for systems, networks, and major application recovery after disruptions?

Correct
 
5 of 8
6
Question

Which of the following identifies the individuals to communicate with external entities?

Correct
 
6 of 8
7
Question

Which of the following plan focuses on malware, hackers, intrusions, attacks, and other security issues?

Correct


Which of the following tool would you use to scan a Web application for vulnerabilities?

Correct
 
5 of 10
6
Question

In a Syslog implementation, which of the following component is an agent that collects the information from various devices and servers on the network?

Correct
 
6 of 10
7
Question

Which of the following tasks can be performed by the NXLog tool? [Choose all that apply]

Correct
 
7 of 10
8
Question

In an Email, which of the following are metadata? [Choose all that apply]

Correct
 
8 of 10
9
Question

Which of the following statements describes the core purpose of using Tcpdump?

Correct
1
Question

Which of the following can be considered as Personally identifiable information? [Choose all that apply]

Correct
 
1 of 5
2
Question

Which of the following hashing algorithm is the common standard used for generating digital signatures?

Correct
 
2 of 5
3
Question

How many steps are involved in the forensic investigation process?

Correct
 
3 of 5
4
Question

Which type of evidence collection methods can be used when litigation might be needed? [Choose all that apply]

Correct























































































































































































































































































































































































































































Comments

Popular posts from this blog

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...

IS5503 Cloud Computing Solutions

  Week-1 Pre Assessment 1) You are working as a cloud architect at Congruence crop. Management he asked you to implement an vitualized infrastructure to provide the company’s  employees with on-demand storage which should be accessible through a web interface over the public internet. Which of the following cloud deployment models will you use to implement this ? Private 2) Which of the following storage solutions saves space by eliminating files or blocks that have redundant data? Deduplication 3) You are as a cloud administrator at BigCo. Management he asked you to move the company’s on-premises data to the cloud. You have received a request from the network administration team while migrating. They want to manage both the Linux- and Windows-based servers efficiently. What should you implement to accomplish this task? Secure Shell Remote Desktop Protocol 4) Ron, a security analyst, found an unkwon design flaw in a product. He notices that correc...