SlideShare a Scribd company logo
STRAYER CIS 333 Week 11 Final Exam Set 3 NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-333-strayer/cis-
333-week-11-final-exam-set-3-recent
For more classes visit
http://www.uopassignments.com
Question 1 The world needs people who understand computer-
systems ________ and who can protect computers and networks
from criminals and terrorists.
Question 2 Connecting your computers or devices to the ________
immediately exposes them to attack.
Question 3 The physical part of the LAN Domain includes a
__________, which is an interface between the computer and the
LAN physical media.
Question 4 Which of the following is the definition of
ciphertext?
Question 5 Which of the following describes the Family
Educational Rights and Privacy Act (FERPA)?
Question 6 ____________ is the amount of time it takes to recover
and make a system, application, and data available for use after
an outage.
Question 7 A ________ examines the network layer address and
routes packets based on routing protocol path determination
decisions.
Question 8 What term is used to describe the amount of time
that an IT system, application, or data is not available to users?
Question 9 What name is given to a U.S. federal law that
requires U.S. government agencies to protect citizens’ private
data and have proper security controls in place?
Question 10 SIP is a ___________ protocol used to support real-
time communications.
Question 11 What term is used to describe a strategy that uses
a device to provide electrical power for IP phones from the RJ-
45 8-pin jacks directly to the workstation outlet?
Question 12 A common DSL service is ________, where the
bandwidth is different for downstream and upstream traffic.
Question 13 ________ is the basis for unified communications and
is the protocol used by real-time applications such as IM chat,
conferencing, and collaboration.
Question 14 What name is given to a software-based
application like WebEx that supports audio conferencing and
sharing of documents (text, spreadsheets, presentations, etc.)
for real-time discussions with team members or colleagues?
Question 15 Medical practices and hospitals realized early on
that ________ provide(s) the ability to provide access to the
necessary information without having to invest in many
computers and network infrastructure.
Question 16 What is meant by digital subscriber line (DSL)?
Question 17 What is meant by application convergence?
Question 18 What term is used to describe streamlining
processes with automation or simplified steps?
Question 19 As users upgrade LANs to GigE or 10GigE, switches
must support ________ and data IP traffic.
Question 20 During the late 1980s into the early 1990s, service
providers converted the core switches at their central offices
from ______________ to digital central office (CO) switches.
Question 21 What is meant by firewall?
Question 22 What is meant by promiscuous mode?
Question 23 Malicious software can be hidden in a ________.
Question 24 Another type of attacker is called a ________. This is a
person with little or no skill who simply follows directions or
uses a “cookbook” approach to carrying out a cyberattack
without understanding the meaning of the steps he or she is
performing.
Question 25 Loss of financial assets due to ________ is a worst-
case scenario for all organizations.
Question 26 What term is used to describe an attack in which
the attacker gets between two parties and intercepts messages
before transferring them on to their intended destination?
Question 27 In popular usage and in the media, the term ________
often describes someone who breaks into a computer system
without authorization.
Question 28 What is meant by pharming?
Question 29 Black-hat hackers generally poke holes in systems,
but do not attempt to disclose __________ they find to the
administrators of those systems.
Question 30 ________ is a method that black-hat hackers use to
attempt to compromise logon and password access controls,
usually following a specific attack plan, including the use of
social engineering to obtain user information.
Question 31 __________ is rapidly becoming an increasingly
important aspect of enterprise computing.
Question 32 When you accept a __________, you take no further
steps to resolve.
Question 33 The recovery point objective (RPO) identifies the
amount of _________ that is acceptable.
Question 34 What is meant by risk register?
Question 35 A ___________ primarily addresses the processes,
resources, equipment, and devices needed to continue
conducting critical business activities when an interruption
occurs that affects the business’s viability.
Question 36 What name is given to any risk that exists but has a
defined response?
Question 37 How often should an organization perform a risk
management plan?
Question 38 What is the difference between a BCP and a DRP?
Question 39 Your _________ plan shows that you have examined
risks to your organization and have developed plans to address
each risk.
Question 40 Which of the following best describes quantitative
risk analysis?
Question 41 A communication protocol that is connectionless
and is popular for exchanging small amounts of data or
messages is called ________.
Question 42 ________ is an authorization method in which access
to resources is decided by the user’s formal status.
Question 43 ________ is used to describe a property that indicates
that a specific subject needs access to a specific object. This is
necessary to access the object in addition to possessing the
proper clearance for the object’s classification.
Question 44 What is meant by physically constrained user
interface?
Question 45 A method of restricting resource access to specific
periods of time is called ________.
Question 46 An organization’s facilities manager might give you
a security card programmed with your employee ID number,
also known as a ________.
Question 47 Which of the following adequately defines
continuous authentication?
Question 48 What name is given to an access control method
that bases access control approvals on the jobs the user is
assigned?
Question 49 _____________is the process of dividing a task into a
series of unique activities performed by different people, each
of whom is allowed to execute only one part of the overall task.
Question 50 Which of these biometric authentication methods
is not as accurate as the rest?
Question 51 One of the most popular types of attacks on
computer systems involves ___________. These attacks deceive or
use people to get around security controls. The best way to
avoid this risk is to ensure that employees know how to handle
such attacks.
Question 52 What is meant by certification?
Question 53 Your organization’s __________ sets the tone for how
you approach related activities.
Question 54 The primary task of an organization’s __________
team is to control access to systems or resources.
Question 55 What is meant by standard?
Question 56 Enacting changes in response to reported
problems are called ________.
Question 57 From the perspective of a _________ professional,
configuration management evaluates the impact a modification
might have on security.
Question 58 ___________ are the benchmarks that help make sure
a minimum level of security exists across multiple applications
of systems and across different products.
Question 59 ________ is the process of managing changes to
computer/device configuration or application software.
Question 60 What term is used to describe a set of step-by-step
actions to be performed to accomplish a security requirement,
process, or objective?
Question 61 One of the best ways to avoid wasting your
organization’s resources is to ensure that you follow the ________
review cycle.
Question 62 Which of the following is the definition of
hardened configuration?
Question 63 As your organization evolves and as threats
mature, it is important to make sure your __________ still meet(s)
the risks you face today.
Question 64 Security audits help ensure that your rules and
__________ are up to date, documented, and subject to change
control procedures.
Question 65 ________ provides information on what is happening
as it happens.
Question 66 What is a Security Information and Event
Management (SIEM) system?
Question 67 ________ gives you the opportunity to review your
risk-management program and to confirm that the program
has correctly identified and reduced (or otherwise addressed)
the risks to your organization.
Question 68 Which of the following defines network mapping?
Question 69 Audits also often look at the current configuration
of a system as a snapshot in time to verify that it complies with
________.
Question 70 Which of the following is the definition of anomaly-
based IDS?
Question 71 An attacker or event that might exploit a
vulnerability is a(n) ____________.
Question 72 You must consider many factors when evaluating
countermeasures. Countermeasures might generate more calls
to the help desk, slower response times for users, and so on.
This is referred to as ________.
Question 73 An organization knows that a risk exists and has
decided that the cost of reducing it is higher than the loss would
be. This can include self-insuring or using a deductible. This is
categorized as ________.
Question 74 ________ allows an organization to transfer risk to
another entity. Insurance is a common way to reduce risk.
Question 75 A(n) ________ is an intent and method to exploit a
vulnerability.
Question 76 It is necessary to create and/or maintain a plan
that makes sure your company continues to operate in the face
of disaster. This is known as a ________.
Question 77 ___________ is the likelihood that a particular threat
exposes a vulnerability that could damage your organization.
Question 78 An intrusion detection system (IDS) is an example
of ___________ controls.
Question 79 A _____________ is a flaw or weakness in a system’s
security procedures, design, implementation, or internal
controls.
Question 80 Forensics and incident response are examples of
___________ controls.
Question 81 What name is given to an encryption cipher that is
a product cipher with a 56-bit key consisting of 16 iterations of
substitution and transformation?
Question 82 What name is given to an encryption cipher that
uniquely maps any letter to any other letter?
Question 83 Without any knowledge of the key, an attacker
with access to an encrypted message and the decryption cipher
could try every possible key to decode the message. This is
referred to as ________.
Question 84 In a ________, the cryptanalyst possesses certain
pieces of information before and after encryption.
Question 85 Cryptography accomplishes four security goals:
nonrepudiation, integrity, authentication, and ________________.
Question 86 _______________ enables you to prevent a party from
denying a previous statement or action.
Question 87 Cryptography accomplishes four security goals:
confidentiality, integrity, authentication, and ________________.
Question 88 ________ is the act of unscrambling ciphertext into
plaintext.
Question 89 A ________ is an encryption key used to encrypt other
keys before transmitting them.
Question 90 What is meant by key distribution?
Question 91 A _____________ contains rules that define the types of
traffic that can come and go through a network.
Question 92 ________ is a suite of protocols designed to connect
sites securely using IP networks.
Question 93 Which OSI Reference Model layer creates,
maintains, and disconnects communications that take place
between processes over the network?
Question 94 What name is given to a protocol to implement a
VPN connection between two computers?
Question 95 A firewall that examines each packet it receives
and compares the packet to a list of rules configured by the
network administrator is the definition of ________.
Question 96 Network ________ is gathering information about a
network for use in a future attack.
Question 97 Which OSI Reference Model layer is responsible for
the coding of data?
Question 98 Which OSI Reference Model layer must translate
the binary ones and zeros of computer language into the
language of the transport medium?
Question 99 A ___________ controls the flow of traffic by
preventing unauthorized network traffic from entering or
leaving a particular portion of the network.
Question 100 Which OSI Reference Model layer is responsible
for transmitting information on computers connected to the
same local area network (LAN)?
Question 101 _____________ are the main source of distributed
denial of service (DDoS) attacks and spam.
Question 102 A ________ is a virus that attacks and modifies
executable programs (like COM, EXE, SYS, and DLL files).
Question 103 ________ include a separate encryption engine that
stores the virus body in encrypted format while duplicating the
main body of the virus.
Question 104 ________ attack countermeasures such as antivirus
signature files or integrity databases.
Question 105 A ____________ tricks users into providing logon
information on what appears to be a legitimate Web site but is
in fact a Web site set up by an attacker to obtain this
information.
Question 106 The ________ is a U.S. standards organization whose
goal is to empower its members and constituents to strengthen
the U.S. marketplace position in the global economy, while
helping to ensure the safety and health of consumers and the
protection of the environment.
Question 107 Cascading Style Sheets (CSS), Common Gateway
Interface (CGI), and Hypertext Markup Language (HTML) are
standards developed or endorsed by the ____________.
Question 108 The ____________ is a network of centers around the
United States that offers technical and business assistance to
small- and medium-sized manufacturers.
Question 109 The ________ is the main United Nations agency
responsible for managing and promoting information and
technology issues.
Question 110 The ________ is an organization formed in 1994 to
develop and publish standards for the World Wide Web.
Question 111 What name is given to educational institutions
that meet specific federal information assurance educational
guidelines?
Question 112 The standard bachelor’s degree is a __________
program.
Question 113 The purpose of ________ is to provide formal
training courses that lead to a certificate or professional
certification and not a degree.
Question 114 With university doctoral programs, completing
the degree requirements takes ________.
Question 115 “There are so many demands on your time, it is
often difficult to justify setting aside time to study. Also, you
may find that self-study takes more time than you planned.”
This is a disadvantage to choosing the self-study option that can
be labeled ________.
Question 116 The best fits for (ISC)2’s _____________ are personnel
responsible for developing and implementing processes used
to assess risk and for establishing security requirements.
Question 117 CompTIA’s Security+ certification provides
________.
Question 118 (ISC)2 offers the ________________ credential, which is
one of the few credentials that address developing secure
software. It evaluates professionals for the knowledge and
skills necessary to develop and deploy secure applications.
Question 119 The ____________ concentration from (ISC)2 contains
deeper managerial elements such as project management, risk
management, setting up and delivering a security awareness
program, and managing a business continuity planning
program.
Question 120 The four main credentials of the ________ are
Systems Security Certified Practitioner (SSCP®), Certified
Information Systems Security Professional (CISSP®), Certified
Authorization Professional (CAP®), and Certified Secure
Software Lifecycle Professional (CSSLP®).
Question 121 The regulating agency for the Family Educational
Rights and Privacy Act is the ________.
Question 122 The ________________ ,enacted as part of the
American Recovery and Reinvestment Act of 2009, was
designed to promote the widespread adoption and
standardization of health information technology.
Question 123 The regulating agency for the Sarbanes-Oxley Act
is the ________.
Question 124 Social Security numbers, financial account
numbers, credit card numbers, and date of birth are examples
of __________ as stipulated under GLBA.
Question 125 What name is given to patient health information
that is computer based?

More Related Content

What's hot

CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   
bellflower3
 
Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
amaranthbeg146
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
donaldzs97
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.com
Bartholomew19
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
Baileya82
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.com
Davis104
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
IRJET Journal
 
Cis 359 Enthusiastic Study - snaptutorial.com
Cis 359 Enthusiastic Study - snaptutorial.comCis 359 Enthusiastic Study - snaptutorial.com
Cis 359 Enthusiastic Study - snaptutorial.com
Stephenson01
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
IJNSA Journal
 
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows DesktopCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
PortalGuard
 

What's hot (10)

CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   
 
Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.com
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.com
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
Cis 359 Enthusiastic Study - snaptutorial.com
Cis 359 Enthusiastic Study - snaptutorial.comCis 359 Enthusiastic Study - snaptutorial.com
Cis 359 Enthusiastic Study - snaptutorial.com
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows DesktopCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
 

Similar to Strayer cis 333 week 11 final exam set 3 new

Strayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 newStrayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 new
uopassignment
 
Strayer cis 333 week 11 final exam set 2 new
Strayer cis 333 week 11 final exam set 2 newStrayer cis 333 week 11 final exam set 2 new
Strayer cis 333 week 11 final exam set 2 new
uopassignment
 
CIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.comCIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.com
bellflower85
 
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 newStayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
nikig6806
 
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 newStayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
shyaminfo30
 
Strayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 newStrayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 new
Bartholomee
 
Strayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 newStrayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 new
shyaminfo15
 
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 newStayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
uopassignment
 
· Question 12 out of 2 pointsOne of the processes design.docx
· Question 12 out of 2 pointsOne of the processes design.docx· Question 12 out of 2 pointsOne of the processes design.docx
· Question 12 out of 2 pointsOne of the processes design.docx
oswald1horne84988
 
ACC 564 NERD Redefined Education--acc564nerd.com
ACC 564 NERD Redefined Education--acc564nerd.comACC 564 NERD Redefined Education--acc564nerd.com
ACC 564 NERD Redefined Education--acc564nerd.com
claric227
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
bellflower46
 
ACC 564 NERD Become Exceptional--acc564nerd.com
ACC 564 NERD Become Exceptional--acc564nerd.comACC 564 NERD Become Exceptional--acc564nerd.com
ACC 564 NERD Become Exceptional--acc564nerd.com
KeatonJennings117
 
ACC 564 NERD Lessons in Excellence--acc564nerd.com
ACC 564 NERD Lessons in Excellence--acc564nerd.comACC 564 NERD Lessons in Excellence--acc564nerd.com
ACC 564 NERD Lessons in Excellence--acc564nerd.com
thomashard70
 
ACC 564 NERD Education for Service--acc564nerd.com
ACC 564 NERD Education for Service--acc564nerd.comACC 564 NERD Education for Service--acc564nerd.com
ACC 564 NERD Education for Service--acc564nerd.com
RoelofMerwe152
 
ACC 564 NERD Achievement Education--acc564nerd.com
ACC 564 NERD Achievement Education--acc564nerd.comACC 564 NERD Achievement Education--acc564nerd.com
ACC 564 NERD Achievement Education--acc564nerd.com
claric141
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
amaranthbeg147
 
ACC 564 Expect Success/newtonhelp.com
ACC 564 Expect Success/newtonhelp.comACC 564 Expect Success/newtonhelp.com
ACC 564 Expect Success/newtonhelp.com
myblue10
 
ACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.comACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.com
sachin10091
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
jonhson185
 

Similar to Strayer cis 333 week 11 final exam set 3 new (20)

Strayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 newStrayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 new
 
Strayer cis 333 week 11 final exam set 2 new
Strayer cis 333 week 11 final exam set 2 newStrayer cis 333 week 11 final exam set 2 new
Strayer cis 333 week 11 final exam set 2 new
 
CIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.comCIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.com
 
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 newStayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
 
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 newStayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
 
Strayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 newStrayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 new
 
Strayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 newStrayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 new
 
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 newStayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
 
· Question 12 out of 2 pointsOne of the processes design.docx
· Question 12 out of 2 pointsOne of the processes design.docx· Question 12 out of 2 pointsOne of the processes design.docx
· Question 12 out of 2 pointsOne of the processes design.docx
 
ACC 564 NERD Redefined Education--acc564nerd.com
ACC 564 NERD Redefined Education--acc564nerd.comACC 564 NERD Redefined Education--acc564nerd.com
ACC 564 NERD Redefined Education--acc564nerd.com
 
41319760 info-sys (1)
41319760 info-sys (1)41319760 info-sys (1)
41319760 info-sys (1)
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
 
ACC 564 NERD Become Exceptional--acc564nerd.com
ACC 564 NERD Become Exceptional--acc564nerd.comACC 564 NERD Become Exceptional--acc564nerd.com
ACC 564 NERD Become Exceptional--acc564nerd.com
 
ACC 564 NERD Lessons in Excellence--acc564nerd.com
ACC 564 NERD Lessons in Excellence--acc564nerd.comACC 564 NERD Lessons in Excellence--acc564nerd.com
ACC 564 NERD Lessons in Excellence--acc564nerd.com
 
ACC 564 NERD Education for Service--acc564nerd.com
ACC 564 NERD Education for Service--acc564nerd.comACC 564 NERD Education for Service--acc564nerd.com
ACC 564 NERD Education for Service--acc564nerd.com
 
ACC 564 NERD Achievement Education--acc564nerd.com
ACC 564 NERD Achievement Education--acc564nerd.comACC 564 NERD Achievement Education--acc564nerd.com
ACC 564 NERD Achievement Education--acc564nerd.com
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
 
ACC 564 Expect Success/newtonhelp.com
ACC 564 Expect Success/newtonhelp.comACC 564 Expect Success/newtonhelp.com
ACC 564 Expect Success/newtonhelp.com
 
ACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.comACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.com
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 

More from olivergeorg

Uop hcs 131 week 4 teamwork speech new
Uop hcs 131 week 4 teamwork speech newUop hcs 131 week 4 teamwork speech new
Uop hcs 131 week 4 teamwork speech new
olivergeorg
 
Hcr 240 week 9 final project putting it all together
Hcr 240 week 9 final project putting it all togetherHcr 240 week 9 final project putting it all together
Hcr 240 week 9 final project putting it all together
olivergeorg
 
Uop mkt 571 final exam guide
Uop mkt 571 final exam guideUop mkt 571 final exam guide
Uop mkt 571 final exam guide
olivergeorg
 
Devry ecet 105 week 7 i lab add subtractor using flip-flops new
Devry ecet 105 week 7 i lab add subtractor using flip-flops newDevry ecet 105 week 7 i lab add subtractor using flip-flops new
Devry ecet 105 week 7 i lab add subtractor using flip-flops new
olivergeorg
 
Devry ecet 105 week 7 i lab add
Devry ecet 105 week 7 i lab addDevry ecet 105 week 7 i lab add
Devry ecet 105 week 7 i lab add
olivergeorg
 
Devry ecet 105 week 3 i lab introduction to digital logic gates new
Devry ecet 105 week 3 i lab introduction to digital logic gates newDevry ecet 105 week 3 i lab introduction to digital logic gates new
Devry ecet 105 week 3 i lab introduction to digital logic gates new
olivergeorg
 
Devry ecet 105 week 2 i lab soldering techniques and the electronic die kit new
Devry ecet 105 week 2 i lab soldering techniques and the electronic die kit newDevry ecet 105 week 2 i lab soldering techniques and the electronic die kit new
Devry ecet 105 week 2 i lab soldering techniques and the electronic die kit new
olivergeorg
 
Ash ece 430 week 2 journal new
Ash ece 430 week 2 journal newAsh ece 430 week 2 journal new
Ash ece 430 week 2 journal new
olivergeorg
 
Ash ece 430 week 2 assignment lesson plan new
Ash ece 430 week 2 assignment lesson plan newAsh ece 430 week 2 assignment lesson plan new
Ash ece 430 week 2 assignment lesson plan new
olivergeorg
 
Ash ece 430 week 1 reflective journal new
Ash ece 430 week 1 reflective journal newAsh ece 430 week 1 reflective journal new
Ash ece 430 week 1 reflective journal new
olivergeorg
 
Ese 633 week 6 final paper
Ese 633 week 6 final paperEse 633 week 6 final paper
Ese 633 week 6 final paper
olivergeorg
 
Ese 633 week 6 dq 1 course reflection discussion
Ese 633 week 6 dq 1 course reflection discussionEse 633 week 6 dq 1 course reflection discussion
Ese 633 week 6 dq 1 course reflection discussion
olivergeorg
 
Str 581 week 4 individual capstone final exam part 2 new
Str 581 week 4 individual capstone final exam part 2 newStr 581 week 4 individual capstone final exam part 2 new
Str 581 week 4 individual capstone final exam part 2 new
olivergeorg
 
Str 581 week 2 individual capstone final exam part 1 new
Str 581 week 2 individual capstone final exam part 1 newStr 581 week 2 individual capstone final exam part 1 new
Str 581 week 2 individual capstone final exam part 1 new
olivergeorg
 
Srm 320 week 5 final proposal
Srm 320 week 5 final proposalSrm 320 week 5 final proposal
Srm 320 week 5 final proposal
olivergeorg
 
Srm 320 week 1 quiz
Srm 320 week 1 quizSrm 320 week 1 quiz
Srm 320 week 1 quiz
olivergeorg
 
Ash srm 320 week 4 quiz
Ash srm 320 week 4 quizAsh srm 320 week 4 quiz
Ash srm 320 week 4 quiz
olivergeorg
 
Ash srm 320 week 3 quiz
Ash srm 320 week 3 quizAsh srm 320 week 3 quiz
Ash srm 320 week 3 quiz
olivergeorg
 
ACCT 212 entire course new
ACCT 212  entire course newACCT 212  entire course new
ACCT 212 entire course new
olivergeorg
 
Acct 212 final exam
Acct 212 final examAcct 212 final exam
Acct 212 final exam
olivergeorg
 

More from olivergeorg (20)

Uop hcs 131 week 4 teamwork speech new
Uop hcs 131 week 4 teamwork speech newUop hcs 131 week 4 teamwork speech new
Uop hcs 131 week 4 teamwork speech new
 
Hcr 240 week 9 final project putting it all together
Hcr 240 week 9 final project putting it all togetherHcr 240 week 9 final project putting it all together
Hcr 240 week 9 final project putting it all together
 
Uop mkt 571 final exam guide
Uop mkt 571 final exam guideUop mkt 571 final exam guide
Uop mkt 571 final exam guide
 
Devry ecet 105 week 7 i lab add subtractor using flip-flops new
Devry ecet 105 week 7 i lab add subtractor using flip-flops newDevry ecet 105 week 7 i lab add subtractor using flip-flops new
Devry ecet 105 week 7 i lab add subtractor using flip-flops new
 
Devry ecet 105 week 7 i lab add
Devry ecet 105 week 7 i lab addDevry ecet 105 week 7 i lab add
Devry ecet 105 week 7 i lab add
 
Devry ecet 105 week 3 i lab introduction to digital logic gates new
Devry ecet 105 week 3 i lab introduction to digital logic gates newDevry ecet 105 week 3 i lab introduction to digital logic gates new
Devry ecet 105 week 3 i lab introduction to digital logic gates new
 
Devry ecet 105 week 2 i lab soldering techniques and the electronic die kit new
Devry ecet 105 week 2 i lab soldering techniques and the electronic die kit newDevry ecet 105 week 2 i lab soldering techniques and the electronic die kit new
Devry ecet 105 week 2 i lab soldering techniques and the electronic die kit new
 
Ash ece 430 week 2 journal new
Ash ece 430 week 2 journal newAsh ece 430 week 2 journal new
Ash ece 430 week 2 journal new
 
Ash ece 430 week 2 assignment lesson plan new
Ash ece 430 week 2 assignment lesson plan newAsh ece 430 week 2 assignment lesson plan new
Ash ece 430 week 2 assignment lesson plan new
 
Ash ece 430 week 1 reflective journal new
Ash ece 430 week 1 reflective journal newAsh ece 430 week 1 reflective journal new
Ash ece 430 week 1 reflective journal new
 
Ese 633 week 6 final paper
Ese 633 week 6 final paperEse 633 week 6 final paper
Ese 633 week 6 final paper
 
Ese 633 week 6 dq 1 course reflection discussion
Ese 633 week 6 dq 1 course reflection discussionEse 633 week 6 dq 1 course reflection discussion
Ese 633 week 6 dq 1 course reflection discussion
 
Str 581 week 4 individual capstone final exam part 2 new
Str 581 week 4 individual capstone final exam part 2 newStr 581 week 4 individual capstone final exam part 2 new
Str 581 week 4 individual capstone final exam part 2 new
 
Str 581 week 2 individual capstone final exam part 1 new
Str 581 week 2 individual capstone final exam part 1 newStr 581 week 2 individual capstone final exam part 1 new
Str 581 week 2 individual capstone final exam part 1 new
 
Srm 320 week 5 final proposal
Srm 320 week 5 final proposalSrm 320 week 5 final proposal
Srm 320 week 5 final proposal
 
Srm 320 week 1 quiz
Srm 320 week 1 quizSrm 320 week 1 quiz
Srm 320 week 1 quiz
 
Ash srm 320 week 4 quiz
Ash srm 320 week 4 quizAsh srm 320 week 4 quiz
Ash srm 320 week 4 quiz
 
Ash srm 320 week 3 quiz
Ash srm 320 week 3 quizAsh srm 320 week 3 quiz
Ash srm 320 week 3 quiz
 
ACCT 212 entire course new
ACCT 212  entire course newACCT 212  entire course new
ACCT 212 entire course new
 
Acct 212 final exam
Acct 212 final examAcct 212 final exam
Acct 212 final exam
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Strayer cis 333 week 11 final exam set 3 new

  • 1. STRAYER CIS 333 Week 11 Final Exam Set 3 NEW Check this A+ tutorial guideline at http://www.uopassignments.com/cis-333-strayer/cis- 333-week-11-final-exam-set-3-recent For more classes visit http://www.uopassignments.com Question 1 The world needs people who understand computer- systems ________ and who can protect computers and networks from criminals and terrorists. Question 2 Connecting your computers or devices to the ________ immediately exposes them to attack. Question 3 The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media. Question 4 Which of the following is the definition of ciphertext? Question 5 Which of the following describes the Family Educational Rights and Privacy Act (FERPA)? Question 6 ____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage. Question 7 A ________ examines the network layer address and routes packets based on routing protocol path determination decisions.
  • 2. Question 8 What term is used to describe the amount of time that an IT system, application, or data is not available to users? Question 9 What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens’ private data and have proper security controls in place? Question 10 SIP is a ___________ protocol used to support real- time communications. Question 11 What term is used to describe a strategy that uses a device to provide electrical power for IP phones from the RJ- 45 8-pin jacks directly to the workstation outlet? Question 12 A common DSL service is ________, where the bandwidth is different for downstream and upstream traffic. Question 13 ________ is the basis for unified communications and is the protocol used by real-time applications such as IM chat, conferencing, and collaboration. Question 14 What name is given to a software-based application like WebEx that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real-time discussions with team members or colleagues? Question 15 Medical practices and hospitals realized early on that ________ provide(s) the ability to provide access to the necessary information without having to invest in many computers and network infrastructure. Question 16 What is meant by digital subscriber line (DSL)? Question 17 What is meant by application convergence?
  • 3. Question 18 What term is used to describe streamlining processes with automation or simplified steps? Question 19 As users upgrade LANs to GigE or 10GigE, switches must support ________ and data IP traffic. Question 20 During the late 1980s into the early 1990s, service providers converted the core switches at their central offices from ______________ to digital central office (CO) switches. Question 21 What is meant by firewall? Question 22 What is meant by promiscuous mode? Question 23 Malicious software can be hidden in a ________. Question 24 Another type of attacker is called a ________. This is a person with little or no skill who simply follows directions or uses a “cookbook” approach to carrying out a cyberattack without understanding the meaning of the steps he or she is performing. Question 25 Loss of financial assets due to ________ is a worst- case scenario for all organizations. Question 26 What term is used to describe an attack in which the attacker gets between two parties and intercepts messages before transferring them on to their intended destination? Question 27 In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authorization. Question 28 What is meant by pharming?
  • 4. Question 29 Black-hat hackers generally poke holes in systems, but do not attempt to disclose __________ they find to the administrators of those systems. Question 30 ________ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information. Question 31 __________ is rapidly becoming an increasingly important aspect of enterprise computing. Question 32 When you accept a __________, you take no further steps to resolve. Question 33 The recovery point objective (RPO) identifies the amount of _________ that is acceptable. Question 34 What is meant by risk register? Question 35 A ___________ primarily addresses the processes, resources, equipment, and devices needed to continue conducting critical business activities when an interruption occurs that affects the business’s viability. Question 36 What name is given to any risk that exists but has a defined response? Question 37 How often should an organization perform a risk management plan? Question 38 What is the difference between a BCP and a DRP? Question 39 Your _________ plan shows that you have examined risks to your organization and have developed plans to address each risk.
  • 5. Question 40 Which of the following best describes quantitative risk analysis? Question 41 A communication protocol that is connectionless and is popular for exchanging small amounts of data or messages is called ________. Question 42 ________ is an authorization method in which access to resources is decided by the user’s formal status. Question 43 ________ is used to describe a property that indicates that a specific subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object’s classification. Question 44 What is meant by physically constrained user interface? Question 45 A method of restricting resource access to specific periods of time is called ________. Question 46 An organization’s facilities manager might give you a security card programmed with your employee ID number, also known as a ________. Question 47 Which of the following adequately defines continuous authentication? Question 48 What name is given to an access control method that bases access control approvals on the jobs the user is assigned? Question 49 _____________is the process of dividing a task into a series of unique activities performed by different people, each of whom is allowed to execute only one part of the overall task.
  • 6. Question 50 Which of these biometric authentication methods is not as accurate as the rest? Question 51 One of the most popular types of attacks on computer systems involves ___________. These attacks deceive or use people to get around security controls. The best way to avoid this risk is to ensure that employees know how to handle such attacks. Question 52 What is meant by certification? Question 53 Your organization’s __________ sets the tone for how you approach related activities. Question 54 The primary task of an organization’s __________ team is to control access to systems or resources. Question 55 What is meant by standard? Question 56 Enacting changes in response to reported problems are called ________. Question 57 From the perspective of a _________ professional, configuration management evaluates the impact a modification might have on security. Question 58 ___________ are the benchmarks that help make sure a minimum level of security exists across multiple applications of systems and across different products. Question 59 ________ is the process of managing changes to computer/device configuration or application software. Question 60 What term is used to describe a set of step-by-step actions to be performed to accomplish a security requirement, process, or objective?
  • 7. Question 61 One of the best ways to avoid wasting your organization’s resources is to ensure that you follow the ________ review cycle. Question 62 Which of the following is the definition of hardened configuration? Question 63 As your organization evolves and as threats mature, it is important to make sure your __________ still meet(s) the risks you face today. Question 64 Security audits help ensure that your rules and __________ are up to date, documented, and subject to change control procedures. Question 65 ________ provides information on what is happening as it happens. Question 66 What is a Security Information and Event Management (SIEM) system? Question 67 ________ gives you the opportunity to review your risk-management program and to confirm that the program has correctly identified and reduced (or otherwise addressed) the risks to your organization. Question 68 Which of the following defines network mapping? Question 69 Audits also often look at the current configuration of a system as a snapshot in time to verify that it complies with ________. Question 70 Which of the following is the definition of anomaly- based IDS?
  • 8. Question 71 An attacker or event that might exploit a vulnerability is a(n) ____________. Question 72 You must consider many factors when evaluating countermeasures. Countermeasures might generate more calls to the help desk, slower response times for users, and so on. This is referred to as ________. Question 73 An organization knows that a risk exists and has decided that the cost of reducing it is higher than the loss would be. This can include self-insuring or using a deductible. This is categorized as ________. Question 74 ________ allows an organization to transfer risk to another entity. Insurance is a common way to reduce risk. Question 75 A(n) ________ is an intent and method to exploit a vulnerability. Question 76 It is necessary to create and/or maintain a plan that makes sure your company continues to operate in the face of disaster. This is known as a ________. Question 77 ___________ is the likelihood that a particular threat exposes a vulnerability that could damage your organization. Question 78 An intrusion detection system (IDS) is an example of ___________ controls. Question 79 A _____________ is a flaw or weakness in a system’s security procedures, design, implementation, or internal controls. Question 80 Forensics and incident response are examples of ___________ controls.
  • 9. Question 81 What name is given to an encryption cipher that is a product cipher with a 56-bit key consisting of 16 iterations of substitution and transformation? Question 82 What name is given to an encryption cipher that uniquely maps any letter to any other letter? Question 83 Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every possible key to decode the message. This is referred to as ________. Question 84 In a ________, the cryptanalyst possesses certain pieces of information before and after encryption. Question 85 Cryptography accomplishes four security goals: nonrepudiation, integrity, authentication, and ________________. Question 86 _______________ enables you to prevent a party from denying a previous statement or action. Question 87 Cryptography accomplishes four security goals: confidentiality, integrity, authentication, and ________________. Question 88 ________ is the act of unscrambling ciphertext into plaintext. Question 89 A ________ is an encryption key used to encrypt other keys before transmitting them. Question 90 What is meant by key distribution? Question 91 A _____________ contains rules that define the types of traffic that can come and go through a network.
  • 10. Question 92 ________ is a suite of protocols designed to connect sites securely using IP networks. Question 93 Which OSI Reference Model layer creates, maintains, and disconnects communications that take place between processes over the network? Question 94 What name is given to a protocol to implement a VPN connection between two computers? Question 95 A firewall that examines each packet it receives and compares the packet to a list of rules configured by the network administrator is the definition of ________. Question 96 Network ________ is gathering information about a network for use in a future attack. Question 97 Which OSI Reference Model layer is responsible for the coding of data? Question 98 Which OSI Reference Model layer must translate the binary ones and zeros of computer language into the language of the transport medium? Question 99 A ___________ controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network. Question 100 Which OSI Reference Model layer is responsible for transmitting information on computers connected to the same local area network (LAN)? Question 101 _____________ are the main source of distributed denial of service (DDoS) attacks and spam.
  • 11. Question 102 A ________ is a virus that attacks and modifies executable programs (like COM, EXE, SYS, and DLL files). Question 103 ________ include a separate encryption engine that stores the virus body in encrypted format while duplicating the main body of the virus. Question 104 ________ attack countermeasures such as antivirus signature files or integrity databases. Question 105 A ____________ tricks users into providing logon information on what appears to be a legitimate Web site but is in fact a Web site set up by an attacker to obtain this information. Question 106 The ________ is a U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment. Question 107 Cascading Style Sheets (CSS), Common Gateway Interface (CGI), and Hypertext Markup Language (HTML) are standards developed or endorsed by the ____________. Question 108 The ____________ is a network of centers around the United States that offers technical and business assistance to small- and medium-sized manufacturers. Question 109 The ________ is the main United Nations agency responsible for managing and promoting information and technology issues. Question 110 The ________ is an organization formed in 1994 to develop and publish standards for the World Wide Web.
  • 12. Question 111 What name is given to educational institutions that meet specific federal information assurance educational guidelines? Question 112 The standard bachelor’s degree is a __________ program. Question 113 The purpose of ________ is to provide formal training courses that lead to a certificate or professional certification and not a degree. Question 114 With university doctoral programs, completing the degree requirements takes ________. Question 115 “There are so many demands on your time, it is often difficult to justify setting aside time to study. Also, you may find that self-study takes more time than you planned.” This is a disadvantage to choosing the self-study option that can be labeled ________. Question 116 The best fits for (ISC)2’s _____________ are personnel responsible for developing and implementing processes used to assess risk and for establishing security requirements. Question 117 CompTIA’s Security+ certification provides ________. Question 118 (ISC)2 offers the ________________ credential, which is one of the few credentials that address developing secure software. It evaluates professionals for the knowledge and skills necessary to develop and deploy secure applications. Question 119 The ____________ concentration from (ISC)2 contains deeper managerial elements such as project management, risk management, setting up and delivering a security awareness
  • 13. program, and managing a business continuity planning program. Question 120 The four main credentials of the ________ are Systems Security Certified Practitioner (SSCP®), Certified Information Systems Security Professional (CISSP®), Certified Authorization Professional (CAP®), and Certified Secure Software Lifecycle Professional (CSSLP®). Question 121 The regulating agency for the Family Educational Rights and Privacy Act is the ________. Question 122 The ________________ ,enacted as part of the American Recovery and Reinvestment Act of 2009, was designed to promote the widespread adoption and standardization of health information technology. Question 123 The regulating agency for the Sarbanes-Oxley Act is the ________. Question 124 Social Security numbers, financial account numbers, credit card numbers, and date of birth are examples of __________ as stipulated under GLBA. Question 125 What name is given to patient health information that is computer based?