Professional Documents
Culture Documents
Page 1 of 7
Submitted by Cotto,William on 9/10/2013 1:23:32 PM Points Awarded 20.00 Points Missed Percentage 0.00 100%
1. What type of attack occurs when the computer originating the attack causes several other computers to send attack packets? A) Distributed denial of service Feedback: Correct. B) Dormant denial of service C) Duplicated denial of service D) Distributed destruction of service Points Earned: 1.0/1.0 Correct Answer(s): A
3. _____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files. A) Ensuring privacy B) Workflow Feedback: Correct. C) Protecting information D) Compensating for human error Points Earned: 1.0/1.0 Correct Answer(s): B
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
2. Which of the following is a cost of deploying security within an organization? A) Testing security systems B) Training users C) Training consultants D) Both a and b Feedback: Correct.
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
12/9/2013
Test 1
Page 2 of 7
4. A _____ is a fundamental component or container that holds information about all network resources that are grouped within it. A) workgroup B) directory service C) domain Feedback: Correct. D) forest Points Earned: 1.0/1.0 Correct Answer(s): C
5. Remote access security involves requiring a user account and password to access a particular operating system or to be validated to access a network through a directory service. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
6. Source routing attacks are used to interfere with normal access to a network host, Web site, or service by flooding a network with useless information. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
12/9/2013
Test 1
Page 3 of 7
7. At a minimum, how many groups does training involve within an organization? A) 1 B) 2 Feedback: Correct. C) 3 D) 4 Points Earned: 1.0/1.0 Correct Answer(s): B
9. Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
10. Which organization was started by Coopers and Lybrand as the European Security Forum? A) Forum of Incident Response and Security Teams B) SysAdmin, Audit, Network, Security Institute
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
ito
Correct Answer(s): D
rw
Points Earned:
1.0/1.0
ith
Fr ee
8. Which organization offers training in security needs and hosts the Certified Protection Professional certification? A) Computer Emergency Response Team Coordination Center B) InfraGard C) Information Systems Security Association D) American Society for Industrial Security Feedback: Correct.
rit
er an d
To
ols
12/9/2013
Test 1
Page 4 of 7
C) Information Security Forum Feedback: Correct. D) National Security Institute Points Earned: 1.0/1.0 Correct Answer(s): C
11. NDS is a directory service used by Windows 2003 Server to provide a central listing of resources. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
12. When new operating system software is purchased, it should be tested rigorously for security and reliability. A) True B) False
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
12/9/2013
Test 1
Page 5 of 7
Points Earned:
1.0/1.0
Correct Answer(s): C
14. Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998. A) 30 B) 50 C) 75 D) 100 Feedback: Correct. Points Earned: 1.0/1.0 Correct Answer(s): D
16. A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
Points Earned:
1.0/1.0
DF
Ed
ito
rw
ith
Fr ee
15. Employing disaster recovery is vital when a hard disk is damaged or crashes and must be replaced. A) True B) False
rit
er an d
To
ols
12/9/2013
Test 1
Page 6 of 7
17. Operating system and network security is the ability to do which of the following reliably to information? A) Store B) Modify C) Protect D) Grant access to E) All of the above Feedback: Correct. Points Earned: 1.0/1.0 Correct Answer(s): E
19. Attackers may get through a specific NAT device by using a form of source routing called _____. A) a macro B) spoofing C) loose source record route Feedback: Correct. D) multiplexing Points Earned: 1.0/1.0 Correct Answer(s): C
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Correct Answer(s): E
Ed
Points Earned:
1.0/1.0
ito
rw
18. Which of the following is part of the total cost of ownership of a computer network? A) Hardware B) Software C) User support costs D) Maintenance E) All of the above Feedback: Correct.
ith
Fr ee
rit
er an d
To
ols
12/9/2013
Test 1
Page 7 of 7
A) Omnidirectional antenna B) Wireless NIC C) Passwords D) Only a and b Feedback: Correct. E) a, b, and c Points Earned: 1.0/1.0 Correct Answer(s): D
Continue
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
12/9/2013