Review Test Submission: CIST1601 Final
User
Course
CIST1601-Information Security Fund (61447)
Test
CIST1601 Final
Started
Submitted
Status
Completed
Attempt Score
96 out of 100 points
Time Elapsed
Results
Displayed
Submitted Answers, Correct Answers, Incorrectly
Answered Questions
Question 1
1 out of 1 points
A(n) ____________________ risk is one that is higher than the risk appetite of the organization.
Selected
Answer:
significa
nt
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
significant
Question 2
1 out of 1 points
The general approach of the ____________________ protocol is to place the filtering
requirements on the individual workstation rather than on a single point of defense (and thus point
of failure).
Selected
Answer:
SOCK
S
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
SOCKS
Question 3
1 out of 1 points
SANS developed a series of technical security certifications in 1999 that are known as the Global
Information ____________________ Certification or GIAC family of certifications.
Selected
Answer:
Assuran
ce
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
Assurance
Question 4
1 out of 1 points

DoS attacks cannot be launched against routers.
Selected
Answer:
Fals
e
Correct
Answer:
Fals
e
Question 5
1 out of 1 points
Hardware
is the physical technology that houses and executes the software, stores and
transports the data, and provides interfaces for the entry and removal of information from the
system. _________________________
Selected
Answer:
Tru
e
Correct
Answer:
Tru
e
Question 6
1 out of 1 points
A computer virus consists of segments of code that perform ____________________ actions.
Selected
Answer:
malicio
us
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
malicious
Question 7
1 out of 1 points
Software is often created under the constraints of ____________________ management, placing
limits on time, cost, and manpower.
Selected
Answer:
proje
ct
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
project
Question 8
1 out of 1 points
During the ____________________ War, many mainframes were brought online to accomplish
more complex and sophisticated tasks so it became necessary to enable the mainframes to
communicate via a less cumbersome process than mailing magnetic tapes between computer
centers.
Selected
Answer:
Col
d
Correct
Answer:
Evaluation Method
Correct Answer

Exact Match
Cold
Question 9
1 out of 1 points
Alarm ____________________ and compaction is a consolidation of almost identical alarms that
happen at close to the same time into a single higher-level alarm.
Selected
Answer:
Clusteri
ng
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
clustering
Question 10
1 out of 1 points
_____________________ departures include resignation, retirement, promotion, or relocation.
Selected
Answer:
Friendl
y
Correct
Answer:
Evaluation Method
Correct Answer
Exact Match
Friendly
Question 11
1 out of 1 points
Threats cannot be removed without requiring a repair of the vulnerability.


You've reached the end of your free preview.
Want to read all 23 pages?
- Spring '14
- Information Security, Computer Security, Exact Match , Information Security Exam 3 Rutgers