Skip to main content

IS5403 Week

 Lab 1


CER

Speech recognition

PBKDF2

Cell Phones

Weight


Lab 2


DAC

MAC

RBAC

MAC


Lab 3


Playbook

Isolation

UAC

Administrator password


















3
Question

Which of the following is considered as the root of the Active Directory hierarchy?

Correct
 
3 of 8
4
Question

Which of the following statements describe the function of a Trusted Platform Module (TPM)? [Choose all that apply]

Correct
 
4 of 8
5
Question

Multi-factor authentication involves how many minimum methods to authenticate a user?

Correct
 
5 of 8
6
Question

Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes?

Correct
 
6 of 8
7
Question

Which of the following factor is critical in the Gait analysis?

Correct
3
Action item

Which of the following is required for two-factor authentication? [Choose all that apply]

Correct
 
3 of 8
4
Action item

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Correct
 
4 of 8
5
Action item

Which of the following protocol uses port-based authentication?

Correct
 
5 of 8
6
Action item

How many entities are involved in the 802.1x authentication process?

Correct
 
6 of 8
7
Action item

Which of the following authentication method can use location to authenticate a user?

Correct
1
Question

Which type of incident response team is made up of experts who have other duties?

Correct
 
1 of 8
2
Question

Which of the following refers to a duplicate of the organization’s current data center?

Correct
 
2 of 8
3
Question

Which team is dedicated only to incident response?

Correct
 
3 of 8
4
Question

Which of the following contains all the required hardware and connectivity to restore services?

Correct
 
4 of 8
5
Question

Which of the following provides the plan for systems, networks, and major application recovery after disruptions?

Correct
 
5 of 8
6
Question

Which of the following identifies the individuals to communicate with external entities?

Correct
 
6 of 8
7
Question

Which of the following plan focuses on malware, hackers, intrusions, attacks, and other security issues?

Correct


Which of the following tool would you use to scan a Web application for vulnerabilities?

Correct
 
5 of 10
6
Question

In a Syslog implementation, which of the following component is an agent that collects the information from various devices and servers on the network?

Correct
 
6 of 10
7
Question

Which of the following tasks can be performed by the NXLog tool? [Choose all that apply]

Correct
 
7 of 10
8
Question

In an Email, which of the following are metadata? [Choose all that apply]

Correct
 
8 of 10
9
Question

Which of the following statements describes the core purpose of using Tcpdump?

Correct
1
Question

Which of the following can be considered as Personally identifiable information? [Choose all that apply]

Correct
 
1 of 5
2
Question

Which of the following hashing algorithm is the common standard used for generating digital signatures?

Correct
 
2 of 5
3
Question

How many steps are involved in the forensic investigation process?

Correct
 
3 of 5
4
Question

Which type of evidence collection methods can be used when litigation might be needed? [Choose all that apply]

Correct























































































































































































































































































































































































































































Comments

Popular posts from this blog

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...