
IIS 4

Quiz
•
Science
•
University
•
Hard
Hiền Đào
Used 4+ times
FREE Resource
78 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following refers to the work product satisfying the real-world requirements and concepts? Select one:
concurrence
verification
validation
accuracy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an advantage of a qualitative over quantitative risk analysis? Select one:
It makes cost-benefit analysis of recommended controls easier.
It prioritizes the risks and identifies areas for immediate improvement in addressing the vulnerabilities.
It provides specific quantifiable measurements of the magnitude of the impacts.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What represents the amount of time you hold down in a particular key? Select one:
Dynamic time
Flight time
Dwell time
Systems time
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an effective measure against a certain type of brute force password attack? Select one:
Password history is used.
Password used must not be a word found in a dictionary.
Password reuse is not allowed.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following questions is less likely to help in assessing controls over hardware and software maintenance? Select one:
Are system components tested, documented, and approved prior to promotion to production?
Is access to all program libraries restricted and controlled?
Are integrity verification programs used by applications to look for evidences of data tampering, errors, and omissions?
Is there version control?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
They in form of credit card-size memory cards or smart cards, or those resembling small calculators, are used to supply static and dynamic passwords are called:
Tickets
Coupons
Token passing networks
Tokens
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why would an Ethernet LAN in a bus topology have a greater risk of unauthorized disclosure than switched Ethernet in a hub-and-spoke or star topology?
Ethernet is a broadcast technology.
TCP/IP is an insecure protocol.
Hub and spoke connections are highly multiplexed.
IEEE 802.5 protocol for Ethernet cannot support encryption.
Create a free account and access millions of resources
Similar Resources on Wayground
77 questions
Chapter 62: Substance Abuse

Quiz
•
University
82 questions
BMW Management

Quiz
•
University
75 questions
Periodic Table Exam Review

Quiz
•
8th Grade - University
74 questions
3rd prim revision

Quiz
•
3rd Grade - University
75 questions
NC1 SET 1

Quiz
•
University
77 questions
Cuestionario 2

Quiz
•
University
76 questions
ENVISCI 7 3Q

Quiz
•
University
75 questions
Pharm Final Exam Review Part 1

Quiz
•
University
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Science
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
38 questions
Unit 6 Key Terms

Quiz
•
11th Grade - University
20 questions
La Hora

Quiz
•
9th Grade - University
7 questions
Cell Transport

Interactive video
•
11th Grade - University
7 questions
What Is Narrative Writing?

Interactive video
•
4th Grade - University