IT 638 Midterm Examination

IT 638 Midterm Examination

University

30 Qs

quiz-placeholder

Similar activities

Form 2 - Information Technology Quiz

Form 2 - Information Technology Quiz

8th Grade - University

25 Qs

Danger online

Danger online

7th Grade - University

25 Qs

Network + Domain 4: IT Security Concepts Quiz

Network + Domain 4: IT Security Concepts Quiz

University

25 Qs

Networking Quiz

Networking Quiz

University

26 Qs

ICT CHAPTER 1

ICT CHAPTER 1

University

31 Qs

IT Concepts 2

IT Concepts 2

12th Grade - University

25 Qs

Nguyên lý an toàn thông tin

Nguyên lý an toàn thông tin

University

28 Qs

Quiz tentang Sharing Data dalam Jaringan

Quiz tentang Sharing Data dalam Jaringan

11th Grade - University

25 Qs

IT 638 Midterm Examination

IT 638 Midterm Examination

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Jean Roxas

Used 4+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which type of audit can be used to determine whether accounts have been established properly and verify that privilege creep isn't occurring?

Privilege audit

Usage audit

Escalation audit

Report audit Sub-fields Except.

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What kind of physical access device restricts access to a small number of individuals at one time?

Checkpoint

Perimeter security

Security zones

Mantrap

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A firewall that not only examines each packet but also remembers the recent previous packets

Honeynet

Intrusion prevention system

Stateful packet inspection

Port blocking

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An intrusion prevention system that is network based.

Network Intrusion prevention system (NIPS)

Secure Sockets Layer (SSL)

SIEM

proxy server

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This access can be obtained through a smartphone or any Bluetooth device. Once access has been achieved, the attacker can copy data in the same way that they could with any other type of unauthorized access.

Bluetooth

Staffing

Bluesnarfing

Evil twin

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A periodic update that corrects problems in one version of a product is called a(n) __________.

Hotfix

Overhaul

Service pack

Security update

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which cloud delivery model could be considered a pool of services and resources delivered across the Internet by a cloud provider?

Private

Public

Community

Hybrid

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?