You are on page 1of 7

Test 1

Page 1 of 7

Submitted by Cotto,William on 9/10/2013 1:23:32 PM Points Awarded 20.00 Points Missed Percentage 0.00 100%

1. What type of attack occurs when the computer originating the attack causes several other computers to send attack packets? A) Distributed denial of service Feedback: Correct. B) Dormant denial of service C) Duplicated denial of service D) Distributed destruction of service Points Earned: 1.0/1.0 Correct Answer(s): A

E) Both a and c Points Earned: 1.0/1.0 Correct Answer(s): D

3. _____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files. A) Ensuring privacy B) Workflow Feedback: Correct. C) Protecting information D) Compensating for human error Points Earned: 1.0/1.0 Correct Answer(s): B

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Fi

ll P

DF

2. Which of the following is a cost of deploying security within an organization? A) Testing security systems B) Training users C) Training consultants D) Both a and b Feedback: Correct.

Ed

ito

rw

ith

Fr ee

rit

er an d

To

ols

12/9/2013

Test 1

Page 2 of 7

4. A _____ is a fundamental component or container that holds information about all network resources that are grouped within it. A) workgroup B) directory service C) domain Feedback: Correct. D) forest Points Earned: 1.0/1.0 Correct Answer(s): C

5. Remote access security involves requiring a user account and password to access a particular operating system or to be validated to access a network through a directory service. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False

6. Source routing attacks are used to interfere with normal access to a network host, Web site, or service by flooding a network with useless information. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Fi

ll P

DF

Ed

ito

rw

ith

Fr ee

rit

er an d

To

ols

12/9/2013

Test 1

Page 3 of 7

7. At a minimum, how many groups does training involve within an organization? A) 1 B) 2 Feedback: Correct. C) 3 D) 4 Points Earned: 1.0/1.0 Correct Answer(s): B

9. Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True

10. Which organization was started by Coopers and Lybrand as the European Security Forum? A) Forum of Incident Response and Security Teams B) SysAdmin, Audit, Network, Security Institute

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Fi

ll P

DF

Ed

ito

Correct Answer(s): D

rw

Points Earned:

1.0/1.0

ith

Fr ee

8. Which organization offers training in security needs and hosts the Certified Protection Professional certification? A) Computer Emergency Response Team Coordination Center B) InfraGard C) Information Systems Security Association D) American Society for Industrial Security Feedback: Correct.

rit

er an d

To

ols

12/9/2013

Test 1

Page 4 of 7

C) Information Security Forum Feedback: Correct. D) National Security Institute Points Earned: 1.0/1.0 Correct Answer(s): C

11. NDS is a directory service used by Windows 2003 Server to provide a central listing of resources. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False

Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): True

13. What port does DNS use? A) 21 B) 23 C) 53 Feedback: Correct. D) 110

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Fi

ll P

DF

12. When new operating system software is purchased, it should be tested rigorously for security and reliability. A) True B) False

Ed

ito

rw

ith

Fr ee

rit

er an d

To

ols

12/9/2013

Test 1

Page 5 of 7

Points Earned:

1.0/1.0

Correct Answer(s): C

14. Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998. A) 30 B) 50 C) 75 D) 100 Feedback: Correct. Points Earned: 1.0/1.0 Correct Answer(s): D

16. A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices. A) True B) False Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect. Points Earned: 1.0/1.0 Correct Answer(s): False

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Correct Answer(s): True

Fi

ll P

Points Earned:

1.0/1.0

DF

Feedback: Correct Feedback: Correct. Incorrect Feedback: Incorrect.

Ed

ito

rw

ith

Fr ee

15. Employing disaster recovery is vital when a hard disk is damaged or crashes and must be replaced. A) True B) False

rit

er an d

To

ols

12/9/2013

Test 1

Page 6 of 7

17. Operating system and network security is the ability to do which of the following reliably to information? A) Store B) Modify C) Protect D) Grant access to E) All of the above Feedback: Correct. Points Earned: 1.0/1.0 Correct Answer(s): E

19. Attackers may get through a specific NAT device by using a form of source routing called _____. A) a macro B) spoofing C) loose source record route Feedback: Correct. D) multiplexing Points Earned: 1.0/1.0 Correct Answer(s): C

20. Which of the following is a key element used in a wireless attack?

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Fi

ll P

DF

Correct Answer(s): E

Ed

Points Earned:

1.0/1.0

ito

rw

18. Which of the following is part of the total cost of ownership of a computer network? A) Hardware B) Software C) User support costs D) Maintenance E) All of the above Feedback: Correct.

ith

Fr ee

rit

er an d

To

ols

12/9/2013

Test 1

Page 7 of 7

A) Omnidirectional antenna B) Wireless NIC C) Passwords D) Only a and b Feedback: Correct. E) a, b, and c Points Earned: 1.0/1.0 Correct Answer(s): D

Continue

http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...

PD

Fi

ll P

DF

Ed

ito

rw

ith

Fr ee

rit

er an d

To

ols

12/9/2013

You might also like