Quiz SIA2 Chapter 11

Quiz SIA2 Chapter 11

University

10 Qs

quiz-placeholder

Similar activities

Introduction to Mendeley Quiz

Introduction to Mendeley Quiz

University

10 Qs

Introduction to OSHA

Introduction to OSHA

University

15 Qs

Chapter 7

Chapter 7

University

10 Qs

MKT558 - Chapter 1 (Exit Quiz)

MKT558 - Chapter 1 (Exit Quiz)

University

12 Qs

Unit 5-Organizing and Financing Schools/The Law...

Unit 5-Organizing and Financing Schools/The Law...

University

10 Qs

ISO 15489

ISO 15489

University

10 Qs

CN Network Layer Part 1

CN Network Layer Part 1

University

15 Qs

Salesforce App Builder Certification Prep

Salesforce App Builder Certification Prep

10th Grade - Professional Development

10 Qs

Quiz SIA2 Chapter 11

Quiz SIA2 Chapter 11

Assessment

Quiz

Education

University

Medium

Created by

Gerald Galeno

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

There is 5 principles that jointly contribute to system reliability, which one is the system and its information are available to meet operational and contractual obligation

Security

Privacy

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The time-based model of information security can be expressed in the following formula: P > D + R , what is the symbol P?

The time it takes an attacker to break through the various controls that protect the organization’s information assets.

The time it takes for the organization to detect that an attack is in progress

The time it takes to respond to and stop the attack

The time needed to develop the company.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a physical or behavioral characteristic used as an authentication credential??

Defense In Depth

Authentication

Biometric Identifier

Multifactor Authentication

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Routers and firewalls control access by filtering individual packets. Organizations own one or more border routers that connect their internal networks to the Internet Service Provider. Those border routers and the organization’s main firewall use sets of IF-THEN rules, called?

Compability Test

Access Control Lists

Demilitarized Zone

Access Control Matrix

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the specific purpose of the Router?

A.      To control traffic, rather than looking only at the information in the IP and TCP headers.

A.      To determine what to do with arriving packets.

A.      To determine whether that employee should be allowed to access that resource and perform the requested action.

A.      To read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is not a basic step criminals follow to attack information systems?

Find known vulnerabilities

Infect the victim’s network with a virus

Identify potential points of remote entry

Learn as musch as possible about the target and its vulnerabilities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Systems that create logs of all network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions is

A. Intrusion Prevention Systems

B. Computer Incident Response

C. Response Penetration Test

D. Intrusion Detection Systems

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?