Académique Documents
Professionnel Documents
Culture Documents
QUIZNAVIGATION
AWR138WNetworkAssurance
10 11 12
13 14 15 16 17 18
19 20 21 22 23 24
25 26 27
Question1
Incorrect
0.00pointsoutof
1.00
Flagquestion
Monday,June8,2015,1:56PM
Showonepageatatime
Finishreview
Finished
Monday,June8,2015,2:24PM
27mins49secs
Points
14.67/27.00
Grade
54.32outof100.00
Whenconsideringmethodstoprotectyourenduserfrommaliciousattackswhen
usingInternetVoiceservicessuchasSkype,whatisagoodrecommendationto
follow?
Selectone:
a.Monitoringthevoiceconversationsofallemployeesusingskype,and
listeningforanysuspiciousbehavior.
b.SetallsettingsinSkypetotheirdefault,factoryrecommendedsettings.
c.Toconsiderofferingyourendusersalegitimateandeasytouse
alternativetoSkype.
d.AlltheabovearegoodrecommendationsforprotectingIPbasedvoice
services.
Question2
Correct
1.00pointsoutof
1.00
Flagquestion
Acentralizeduserdatabasecanbeusedtoallownetworkusebyfirstidentifying
theuser,andthenbyensuringthat(s)hehastheaccessrightstousenetworking
resources.Whatisitcalledwhenthesystemidentifiesauser?
Selectone:
a.Accessibility
b.Authentication
c.Authorization
d.Accounting
Question3
Incorrect
0.00pointsoutof
1.00
Flagquestion
WhichoneofthefollowingisNOTareasonwhyperimeterdefenses(firewall,
antivirus,etc.)areinsufficientprotectionfordesktopcomputers?(Selectthebest
answer)
Selectone:
a.Somewormsarecapableofdefeatingfirewalls.
b.Malwarecanbedownloadedbyunsuspectingusers,bypassingperimeter
defenses.
c.Employeesmaytransmitmalwarefromoutsidenetworks(i.e.home)via
portablestoragedevices.
d.Usersmaybeluredtodangeroussites,causingtheirbrowserstobe
exploitedandmalwaretobeinstalled.
Question4
Incorrect
Whyislivestreamingvideocontentdifficultforanetworkadministratortodeal
with?
0.00pointsoutof
1.00
Selectone:
Flagquestion
a.ThecontentusesstandardTCPportssuchas80and443.
b.ThecontentconsistentlycomesfromoneortwosourcesontheInternet.
c.Multicastingconfigurationsarecompletelyineffectivewhendealingwith
streamingcontent.
d.Alltheabovearereasonsstreamingcontentisdifficulttoworkwith.
Question5
Whichofthefollowingisanexampleofatechnologicalcontrolthatcanbeused
https://elearning.teex.com/mod/quiz/review.php?attempt=366422
1/5
6/8/2015
specificallytoprotectdesktopcomputers?
0.00pointsoutof
1.00
Selectone:
Flagquestion
a.Emailblacklists
b.Publickeycryptography
c.Webfilters
d.Separationofduties
Question6
Whatisthegoalofthepracticeknownas"separationofduties"?
Correct
1.00pointsoutof
1.00
Flagquestion
Selectone:
a.Topreventoutsiderattacks.
b.Tooptimizeworkflowandminimizeerrors.
c.Topreventinsiderabuse/attacksbyhighrankingorwellplacedindividuals.
d.Toensurecompliancewithlawsandregulations.
Question7
Incorrect
0.00pointsoutof
1.00
Flagquestion
Themoderndaynetworkadministratorisnolongerabletopreventorratelimita
fewsinglesourcesbutratherhastonowjustlearntodealwiththeexpected
behaviorofcomputerusersandbuildsystemsresilientenoughtodealwiththe
_____________concerns.
Selectone:
a.Inappropriatecontent
b.Bandwidth
c.Storagespace
d.Potentialcyberattack
Question8
Incorrect
Whichtype(s)ofAcceptableUsePolicy(ies)is/areappropriatetohaveinan
organization?
0.00pointsoutof
1.00
Selectone:
Flagquestion
a.IndividualAUPsforcomputeruse,Internetaccessandemailuse.
b.IndividualizedAUPsthataretailoredforeachtypeofuser.
c.AunifiedAUPthataddressescomputeruse,Internetaccessandemail
use.
d.BothAandC.
Question9
Correct
1.00pointsoutof
1.00
Flagquestion
Regardingrouters,atraffic________isaunidirectionalcollectionofpackets
whereeachpacketheadersharesthesameexactvaluesasothersforseven
keys,suchassourceIPaddress,destinationIPaddress,sourceport,andso
forth.
Selectone:
a.Bank
b.Flow
c.Path
d.Log
Question10
Incorrect
0.00pointsoutof
1.00
Flagquestion
Whichofthefollowingpoliciescanimprovetheoverallsecurityofdesktop
computerswithinanorganization,withminimaldisruptiontonormaloperations?
(Choosethebestanswer)
Selectone:
a.Restrictingcomputeraccesstouppermanagement
b.DisallowinguseofportableUSBstoragedevices
c.Restrictingemailusetobusinessactivities(i.e.noemailforpersonal
uses)
d.Changingoperatingsystems
Question11
Correct
Whichthreeofthefollowingareprimarymotivationsinthecreationofan
AcceptableUsePolicy?
https://elearning.teex.com/mod/quiz/review.php?attempt=366422
2/5
6/8/2015
Selectoneormore:
a.Protectionoftheorganization'sassets.
b.Protectionoftheorganization'sauditingpractices.
c.Protectionoftheorganization'spersonnel.
d.Protectionoftheorganization'sreputationandlegalstanding.
Question12
Correct
1.00pointsoutof
1.00
Flagquestion
Theprinciplereasonthatapplicationscommonlyusedtocarryonrealtime
communicationspresentasecurityrisktotheorganizationisbecausethese
applicationsusually_____________________.
Selectone:
a.Useproprietarynetworkchannels
b.Aren'taffectedbyantivirussoftware
c.Traversefirewalls
d.Bypassrouters
Question13
DHCP'srelianceuponUDPleavesitopentowhatkindofattack?
Incorrect
0.00pointsoutof
1.00
Flagquestion
Selectone:
a.Stacksmashing
b.Shouldersurfing
c.ManintheMiddle(MiM)
d.DenialofService(DoS)
Question14
Correct
1.00pointsoutof
1.00
Flagquestion
TheideabehindrolebasedIPaddressingisthatanetworkcanbedividedinto
separate________sothatgenericAccessControlListscanbeappliedtothe
devicesthatwilleitherallowordenytrafficwithouttheneedforindividualrulesto
beappliedtospecifichosts.
Selectone:
a.Trafficflows
b.Subnets
c.Protocols
d.AccessControlLists
Question15
Incorrect
Whenitcomestosecuringwebservers,whichoneofthefollowingisNOTa
usefulmethod?
0.00pointsoutof
1.00
Selectone:
Flagquestion
a.Keepservers,operatingsystems,applications,interpreters,etc.uptodate.
b.Ensureinputvalidationbyutilizingregularexpressionsorprogramming
rulesinwebapplications.
c.AvoidtheuseofasessionIDinwebsitecookiessothathackerscannot
exploitthem.
d.DonotallowHTMLtobesubmittedasuserinputtoyourwebsite.
Question16
Correct
Regardingrouters,whichplaneofoperationisresponsibleforaccessing,
monitoring,andconfiguringthedevice?
1.00pointsoutof
1.00
Selectone:
Flagquestion
a.Dataplane
b.Administrationplane
c.Controlplane
d.Managementplane
Question17
Correct
Whatisthetermforadocumentthathasbeenapprovedbyuppermanagement
andpublishedbyanorganization,outliningnewinternalrulesandregulations?
1.00pointsoutof
1.00
Selectone:
Flagquestion
a.Anedict
b.Aprocedure
c.Apolicy
https://elearning.teex.com/mod/quiz/review.php?attempt=366422
3/5
6/8/2015
Question18
Partiallycorrect
0.67pointsoutof
1.00
AttackerstypicallytrytodiscoversessionIDsforreasonsthatarefairlyobvious:
onceanattackerdiscoversasessionID,(s)hecansuccessfullyposeasthat
user.AttackersfrequentlytrytodiscoversessionIDsbyusingwhichthreeofthe
followingtactics:
Flagquestion
Selectoneormore:
a.Packetsniffing
b.Crosssitescripting
c.ManInTheMiddle
d.Bruteforce(i.e.guessingofthesessionID)
Question19
Correct
1.00pointsoutof
1.00
Flagquestion
Thedatacontainedwithinadatabasemaybevulnerableintwodifferentways:
attackerscouldtakeadvantageoftraditionalvulnerabilities(ex:softwaredefects)
or________vulnerabilities(ex:inference).
Selectone:
a.Networklevel
b.Arcane
c.Logical
d.Transportlevel
Question20
Whenitcomestosecuringfileservers,anattacksurfaceis________.
Correct
1.00pointsoutof
1.00
Selectone:
a.Allthewaysinwhichvulnerabilitiesofaparticularsystemcanbeexploited
Flagquestion
b.Adedicatedsystemthathasbeenattacked
c.Thelevelofphysicalsecuritythatanorganizationlacks
d.Aseriesofattacksthatattempttoaltertherecordcachemaintainedby
servers
Question21
Incorrect
0.00pointsoutof
1.00
Flagquestion
Regardingnetworksecurity,________filteringprotectsanetworkfrominvalidor
potentiallymaliciousincomingtraffic(originatingfromoutsidethenetwork)by
blockingthistrafficwhenitentersthenetwork.
Selectone:
a.Progress
b.Egress
c.Process
d.Ingress
Question22
Incorrect
WhichoneofthefollowingdoesNOTpresentsecurityproblemsforDNS
servers?
0.00pointsoutof
1.00
Selectone:
Flagquestion
a.Unlimitedzonetransfers
b.Cachepoisoning
c.Wardriving
d.TheuseofcryptographyinDNSSEC
Question23
Correct
WhichofthesemeasuresisNOTrecommendedforlimitingdamagefrom
insiders?
1.00pointsoutof
1.00
Selectone:
Flagquestion
a.FrequentUpdatingofSystems
b.Limitingcomputingpermissions/privileges("Administrator"rights)
c.FilteringemployeeInternetaccess
d.DisablingJavaScript,ActiveX,andFlashonwebbrowsers
https://elearning.teex.com/mod/quiz/review.php?attempt=366422
4/5
6/8/2015
Whatwouldbethesinglemostimportantconsiderationwhenconsideringacloud
serviceprovider?
1.00pointsoutof
1.00
Selectone:
Flagquestion
a.Theabilityofthecloudprovidertooffermoreincentivestosignacontract
b.Theabilityforthecloudprovidertoreducethepriceoftheirofferingby
sharingserviceswithothercustomers.
c.Theabilityforthecloudprovidertoguaranteeuptimeforyourapplication
d.Theamountoftrustyouhaveintheserviceprovider.
Question25
HowdoPOPandIMAPdifferinregardstotheintegrityofemailmessages?
Correct
1.00pointsoutof
1.00
Flagquestion
Selectone:
a.POPstoresemailmessagesonthestoragefacilityanddownloadscopies,
whileIMAPdownloadsthemdirectlytotheclient.
b.POPandIMAPareidenticalprotocolsthatoriginatedfromseperate
vendors.
c.IMAPstoresemailonthestoragefacilityanddownloadscopies,whilePOP
downloadsthemdirectlytotheclient.
d.IMAPisaproprietaryprotocoldevelopedbyMicrosoft,whilePOPisan
openstandarddevelopedbyOSI.
Question26
Correct
1.00pointsoutof
1.00
Flagquestion
Whydomanyorganizationswishtocontrolthepatchesandupdatesthatare
placedontheirsystem,insteadoflettingtheoperatingsystemdownloadand
installupdatesautomatically?
Selectone:
a.Patchesandupdatescostmoney,andmanyITpersonnelchooseto
expendtheirfundsonotheritems.
b.Patchesandupdatesmaysometimesconflictwithothersoftwareonthe
system,andtheirinstallationmaycausesystemstobecomeunstableorfail
completely.
c.Patchesandupdatesarefrequentlypoorlywritten,andareusually
exploitablebyhackersusingzerodayexploits.
d.Patchesandupdatesarenottypicallyreleaseduntilweeks,sometimes
months,afterthediscoveryofadefect,forcingorganizationstorelyupon
antivirusforcontinuedsecurity.
Question27
Incorrect
0.00pointsoutof
1.00
Flagquestion
Itisgenerallyagoodideatouseacentralizedloggingfacilityforanetworkin
ordertoalleviatethemanagementofinformationandallowforquickresponse
andanalysisofpertinentlogdatafor________purposes.
Selectone:
a.Authentication
b.Availability
c.Accounting
d.Authorization
Finishreview
2012TexasA&MEngineeringExtensionService.Allrightsreserved.
Themeusedunderlicense.
Youareloggedinascleorbetesantos(Logout)
AWR138W
https://elearning.teex.com/mod/quiz/review.php?attempt=366422
5/5