SOLUTION
Knowledge is power, and u've got the power to pass
- 208
- 0
- 1
Community
- Followers
- Following
1 Reviews received
209 items
CSIA Certification Exam With Correct Answers Graded To Pass
Draft is measured by... - inches in water column 
 
Definition of Draft - Difference of pressure INSIDE and OUTSIDE the venting system 
 
Easiest solution to "back puffing" stove? - Give it more air 
 
What has the greatest effect on FLOW? - Size of venting system passageway 
 
A masonry chimney is required by what to have a cleanout if the flue previously vented a solid or liquid fuel appliance? - NFPA 54 (National Fuel Gas Code) 
 
High efficiency gas + oil appliances generate a lot of____ w...
- Exam (elaborations)
- • 12 pages •
Draft is measured by... - inches in water column 
 
Definition of Draft - Difference of pressure INSIDE and OUTSIDE the venting system 
 
Easiest solution to "back puffing" stove? - Give it more air 
 
What has the greatest effect on FLOW? - Size of venting system passageway 
 
A masonry chimney is required by what to have a cleanout if the flue previously vented a solid or liquid fuel appliance? - NFPA 54 (National Fuel Gas Code) 
 
High efficiency gas + oil appliances generate a lot of____ w...
CSIA FINAL EXAM 7 QUESTIONS WITH 100% CORRECT ANSWERS GRADED TO PASS
What is the main difference between a worm and a virus? 
 
A worm requires an execution mechanism to start, while a virus can start itself. 
 
A worm tries to gather information, while a virus tries to destroy data. 
 
A worm can replicate itself, while a virus requires a host for distribution. 
 
A worm is restricted to one system, while a virus can spread from system to system. - *A worm can replicate itself, while a virus requires a host for distribution.* 
 
A collection of zombie computers ...
- Exam (elaborations)
- • 21 pages •
What is the main difference between a worm and a virus? 
 
A worm requires an execution mechanism to start, while a virus can start itself. 
 
A worm tries to gather information, while a virus tries to destroy data. 
 
A worm can replicate itself, while a virus requires a host for distribution. 
 
A worm is restricted to one system, while a virus can spread from system to system. - *A worm can replicate itself, while a virus requires a host for distribution.* 
 
A collection of zombie computers ...
The Official CSIA Exam With 100% Correct Answers Graded To Pass
What is a corbel? - masonry projecting upward and outward from a wall or chimney 
 
A cricket is designed to_________. - redirect water and snow away from the chimney 
 
What is a wythe? - A course of brick separating flues within a chimney 
 
When a round flue is used for the lining of a fireplace chimney the proper fireplace opening to flue size ratio should be? - 12:1 
 
Where unlined the smoke chamber walls shall be what thickness? - 8" 
 
When the opening of the fireplace is 6 square feet ...
- Exam (elaborations)
- • 13 pages •
What is a corbel? - masonry projecting upward and outward from a wall or chimney 
 
A cricket is designed to_________. - redirect water and snow away from the chimney 
 
What is a wythe? - A course of brick separating flues within a chimney 
 
When a round flue is used for the lining of a fireplace chimney the proper fireplace opening to flue size ratio should be? - 12:1 
 
Where unlined the smoke chamber walls shall be what thickness? - 8" 
 
When the opening of the fireplace is 6 square feet ...
I2Cyber - Chapter 2 Exam (Q & A) Graded To Pass
security vulnerability - any type of hardware or software defect that malicious users attempt to exploit 
 
an exploit - a program written to take advantage of a known security vulnerability 
 
a cyberattack - the act of using an exploit against a vulnerability with the goal of breaking into the target system 
 
software vulnerabilities - usually caused by errors in operating system or application code 
 
security patches and updates - released by operating system and application producers to av...
- Exam (elaborations)
- • 5 pages •
security vulnerability - any type of hardware or software defect that malicious users attempt to exploit 
 
an exploit - a program written to take advantage of a known security vulnerability 
 
a cyberattack - the act of using an exploit against a vulnerability with the goal of breaking into the target system 
 
software vulnerabilities - usually caused by errors in operating system or application code 
 
security patches and updates - released by operating system and application producers to av...
CSIA105 EXAM (Q & A) GRADED TO PASS
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake? 
a. Budgeting 
b. Planning 
c. Documentation 
d. Approval - b. Planning 
 
Which of the following is NOT a characteristic of a penetration test? 
a. May use internal employees or external consultants 
b. Automated 
c. Finds deep vulnerabilities 
d. Performed occasionally - b. Automated 
 
Linnea has requested to be placed on the penetration testing ...
- Exam (elaborations)
- • 4 pages •
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake? 
a. Budgeting 
b. Planning 
c. Documentation 
d. Approval - b. Planning 
 
Which of the following is NOT a characteristic of a penetration test? 
a. May use internal employees or external consultants 
b. Automated 
c. Finds deep vulnerabilities 
d. Performed occasionally - b. Automated 
 
Linnea has requested to be placed on the penetration testing ...
CSIA105 EXAM QUESTIONS AND CORRECT ANSWERS GRADED TO PASS
An IOC occurs when what metric exceeds its normal bounds? 
a. IRR 
b. LRG 
c. EXR 
d. KRI - d. KRI 
 
What are the two concerns about using public information sharing centers? 
a. Privacy and speed 
b. Security and privacy 
c. Regulatory approval and sharing 
d. Cost and availability - a. Privacy and speed 
 
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information? 
a. PCII 
b. TLP 
c. CISA 
d. FOIA - b. TLP 
...
- Exam (elaborations)
- • 4 pages •
An IOC occurs when what metric exceeds its normal bounds? 
a. IRR 
b. LRG 
c. EXR 
d. KRI - d. KRI 
 
What are the two concerns about using public information sharing centers? 
a. Privacy and speed 
b. Security and privacy 
c. Regulatory approval and sharing 
d. Cost and availability - a. Privacy and speed 
 
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information? 
a. PCII 
b. TLP 
c. CISA 
d. FOIA - b. TLP 
...
CSI 104-chap3 Exam Questions and Correct Answers Graded To Pass
1. A byte consists of _______ bits. 
a. 2 
b. 4 
c. 8 
d. 16 - c. 8 
 
2. In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits. 
a. 4 
b. 5 
c. 6 
d. 7 - c. 6 
 
3. How many symbols can be represented by a bit pattern with ten bits? 
a. 128 
b. 256 
c. 512 
d. 1024 - d. 1024 
 
4. If the ASCII code for E is 1000101, then the ASCII code for e is _______. Answer the question without consulting the ASCII table. 
a. 1000110 
b. 1000111 
c. 0000110 
d. 1100101 - d. 110010...
- Exam (elaborations)
- • 3 pages •
1. A byte consists of _______ bits. 
a. 2 
b. 4 
c. 8 
d. 16 - c. 8 
 
2. In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits. 
a. 4 
b. 5 
c. 6 
d. 7 - c. 6 
 
3. How many symbols can be represented by a bit pattern with ten bits? 
a. 128 
b. 256 
c. 512 
d. 1024 - d. 1024 
 
4. If the ASCII code for E is 1000101, then the ASCII code for e is _______. Answer the question without consulting the ASCII table. 
a. 1000110 
b. 1000111 
c. 0000110 
d. 1100101 - d. 110010...
CSI 104-chap7 Exam Questions and Correct Answers
1. _______ is a program that facilitates the execution of other programs. 
a. An operating system 
b. Hardware 
c. A queue 
d. An application program - a. An operating system 
 
2Multi-programming requires a _______ operating-system. 
A. batch 
B. time-sharing 
C. parallel 
D. distributed - B. time-sharing 
 
3_______ is multi-programming with swapping. 
a. Partitioning 
b. Paging 
c. Demand paging 
d. Queuing - c. Demand paging 
 
4. _______ is multi-programming without swapping. 
a. Partitioni...
- Exam (elaborations)
- • 4 pages •
1. _______ is a program that facilitates the execution of other programs. 
a. An operating system 
b. Hardware 
c. A queue 
d. An application program - a. An operating system 
 
2Multi-programming requires a _______ operating-system. 
A. batch 
B. time-sharing 
C. parallel 
D. distributed - B. time-sharing 
 
3_______ is multi-programming with swapping. 
a. Partitioning 
b. Paging 
c. Demand paging 
d. Queuing - c. Demand paging 
 
4. _______ is multi-programming without swapping. 
a. Partitioni...
CSI EXAM (Q & A) GRADED TO PASS
Which of the following does continual service improvement (CSI) provide guidance on? 
How to improve process efficiency and effectiveness | 
How to improve services | 
Improvement of all stages of the service lifecycle 
Measurement of processes and services - All of the above 
 
Which is the first activity of the CSI model? - Understand the business vision and objectives 
 
Which of the following is not a metric described in CSI? - Personnel Metric 
 
Which of the following are objectives in...
- Exam (elaborations)
- • 6 pages •
Which of the following does continual service improvement (CSI) provide guidance on? 
How to improve process efficiency and effectiveness | 
How to improve services | 
Improvement of all stages of the service lifecycle 
Measurement of processes and services - All of the above 
 
Which is the first activity of the CSI model? - Understand the business vision and objectives 
 
Which of the following is not a metric described in CSI? - Personnel Metric 
 
Which of the following are objectives in...
CSI 104 EXAM QUESTIONS AND ANSWERS GRADED TO PASS
The ________ model is the basis for today's computers. - von Neumann 
 
In a computer, the ________ subsystem stores data and programs. - memory 
 
In a computer, the ________ subsystem performs calculations and 
logical operations. - ALU 
 
1-4 In a computer, the ________ subsystem accepts data and programs and 
sends processing results to output devices. - input/output 
 
1-5 In a computer, the ________ subsystem serves as a manager of the 
other subsystems. - control unit 
 
1-6 According to...
- Exam (elaborations)
- • 31 pages •
The ________ model is the basis for today's computers. - von Neumann 
 
In a computer, the ________ subsystem stores data and programs. - memory 
 
In a computer, the ________ subsystem performs calculations and 
logical operations. - ALU 
 
1-4 In a computer, the ________ subsystem accepts data and programs and 
sends processing results to output devices. - input/output 
 
1-5 In a computer, the ________ subsystem serves as a manager of the 
other subsystems. - control unit 
 
1-6 According to...
Cumulative Exam Questions With 100% Correct Answers