MIS589 Week 6 Test Your Knowledge; Quiz(v2)
1. Question. (TCO E) Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? (Points : 1) 2. Question. (TCO E) An example of data would be if a computer virus eliminated files on that computer. (Points : 1) 3. Question. (TCO E) A network switch failure is an example of a(n) threat. (Points : 1) 4. Question. (TCO E) Developing helps develop a secure network. (Points : 1) 5. Question. (TCO E) A assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. (Points : 1) 6. Question. (TCO E) A(n) , is an information system that is critical to the survival of an organization. (Points : 1) 7. Question. (TCO E) A(n) is any potential adverse occurrence that can do harm or interrupt the system using the network to cause monetary loss to the organization. (Points : 1) 8. Question. (TCO E) Threat of intrusion comes from (Points : 1) 9. Question. (TCO E) A(n) is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. (Points : 1) 10. Question. (TCO E) A (n) is a special type of virus that spreads itself without human intervention. (Points : 1) 11. Question. (TCO E) A is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users’ messages from being processed. (Points : 1) 12. Question. (TCO E) Which of the following is not a method for deterring intrusion? (Points : 1) 13. Question. (TCO E) Which of the following type of media is least susceptible to eavesdropping? (Points : 1) 14. Question. (TCO E) Which of the following are usually the first choice for eavesdropping? (Points : 1) 15. Question. (TCO E) A sniffer program is a (Points : 1) type of macro-virus. 16. Question. (TCO E) is an encryption standard that uses a total of 168 bits as the key. (Points: 1) 17. Question. (TCO E) A is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization’s network. (Points : 1) 18. Question. (TCO E) A security hole is a(n) (Points : 1) 19. Question. (TCO E) IP spoofing means to (Points : 1) 20. Question. (TCO E) IP security protocol (Points : 1)
Written for
- Institution
-
Devry University
- Course
-
MIS 589 (MIS589)
Document information
- Uploaded on
- May 9, 2022
- Number of pages
- 7
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- mis589
- mis589 week 6
-
mis589 week 6 test your knowledge quizv2
Also available in package deal