CIST1601-Information Security Fund Final Exam - Review Test Submission CIST1601 Final User Course Test Started Submitted Status Attempt Score Time

CIST1601-Information Security Fund Final Exam - Review Test...

This preview shows page 1 - 4 out of 23 pages.

Review Test Submission: CIST1601 Final   User Course CIST1601-Information Security Fund (61447) Test CIST1601 Final Started Submitted Status Completed Attempt Score 96 out of 100 points Time Elapsed Results Displayed Submitted Answers, Correct Answers, Incorrectly Answered Questions Question 1 1 out of 1 points A(n) ____________________ risk is one that is higher than the risk appetite of the organization. Selected Answer: significa nt Correct Answer: Evaluation Method Correct Answer Exact Match significant Question 2 1 out of 1 points The general approach of the ____________________ protocol is to place the filtering requirements on the individual workstation rather than on a single point of defense (and thus point of failure). Selected Answer: SOCK S Correct Answer: Evaluation Method Correct Answer Exact Match SOCKS Question 3 1 out of 1 points SANS developed a series of technical security certifications in 1999 that are known as the Global Information ____________________ Certification or GIAC family of certifications. Selected Answer: Assuran ce Correct Answer: Evaluation Method Correct Answer Exact Match Assurance Question 4 1 out of 1 points
Image of page 1
DoS attacks cannot be launched against routers. Selected Answer: Fals e Correct Answer: Fals e Question 5 1 out of 1 points Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________ Selected Answer: Tru e Correct Answer: Tru e Question 6 1 out of 1 points A computer virus consists of segments of code that perform ____________________ actions. Selected Answer: malicio us Correct Answer: Evaluation Method Correct Answer Exact Match malicious Question 7 1 out of 1 points Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower. Selected Answer: proje ct Correct Answer: Evaluation Method Correct Answer Exact Match project Question 8 1 out of 1 points During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers. Selected Answer: Col d Correct Answer: Evaluation Method Correct Answer
Image of page 2
Exact Match Cold Question 9 1 out of 1 points Alarm ____________________ and compaction is a consolidation of almost identical alarms that happen at close to the same time into a single higher-level alarm. Selected Answer: Clusteri ng Correct Answer: Evaluation Method Correct Answer Exact Match clustering Question 10 1 out of 1 points _____________________ departures include resignation, retirement, promotion, or relocation. Selected Answer: Friendl y Correct Answer: Evaluation Method Correct Answer Exact Match Friendly Question 11 1 out of 1 points Threats cannot be removed without requiring a repair of the vulnerability.
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 23 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture