Skip to main content

MSTM 5003 Computer And Network Security N2A

 

Week-2 Quiz

 

1). What step can be taken to evaluate the effectiveness of the security measures in place at an organization?

Perform a vulnerability assessment.

 

2). Which term describes a legal agreement between partners establishing the terms, conditions, and expectations of the relationship between the partners?

Business partnership agreement (BPA)

3). Which password best meets typical complexity requirements?

p@ssw0rD

4). What is a leading cause of account hijacking?

Improper use and/or control over passwords

 

5). Who is responsible for the determination of policies for a given system?

System owner

 

6). Which term eliminates the traditional land lines in an organization and replaces them with special telephones that connect to the IP data network?

Voice over IP (VoIP)

 

7). Which term generally refers to the standard of care a reasonable person is expected to exercise in all situations?

Due Care

 

8). Which term describes a method to check the security of a system by simulating an attack by a malicious individual?

Penetration test

 

9). Which term describes a specialized agreement between organizations that have interconnected IT systems, the purpose of which is to document the security requirements associated with the interconnection?

Interconnection security agreement (ISA)

 

10). Before magnetic storage media (such as disks or tapes) is discarded in the trash or sold for salvage, it should have all files deleted and should be overwritten at least __________ times with all 1’s, all 0’s, and then random characters.

Three

11). Which statement accurately describes how pharming is accomplished?

The user is directed to a fake web site as a result of modification of local host files, which are used to convert URLs to the appropriate IP address.

 

12). Voice communication caller ID systems can be spoofed.

True

13). Which statement describes how shoulder surfing is accomplished?

An attacker directly observes the target entering sensitive information on a form, keypad, or keyboard.

 

14). A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldn’t do.

True

 

15). Which password is weakest?

P@$$w0rd

 

16). Reverse social engineering is easier to execute than social engineering.

False

 

17). Which password is strongest?

C#as%t*1ng

 

18). Impersonation can be employed in online attacks.

True

 

19). Which statement identifies a good first step for companies to take to fight potential social engineering attacks?

Establish policies and procedures dictating the roles and responsibilities all users, as well as security administrators.

 

20). Which term is used when an attacker attempts to get credit card numbers using telephone and voice communication technologies?

Vishing

           

 

 

 

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What is the process called where missing data is fixed? a). Imputing   2. According to the instructor