11/17/2019Module 4 Quiz - Communication and Network Security: Information Security.Fall20191/17Module 4 Quiz - Communication and Network SecurityDueNov 17 at 11:59pmPoints100Questions25AvailableNov 11 at 12am - Nov 17 at 11:59pm 7 daysTime Limit90 MinutesInstructionsA±empt HistoryAttemptTimeScoreLATESTAttempt 1 51 minutes92 out of 100Score for this quiz: 92out of 100Submitted Nov 17 at 1:50pmThis attempt took 51 minutes.You may only take the quiz once. Find the detailed information in Module 4 Quiz instruction. Clickthe Take the Quizbutton below to begin the quiz.4 / 4 ptsQuestion 1Radio frequency identification technologies rely on which of the following toensure security?Defense-in-depth strategy Defense-in-time strategy Defense-in-technology strategy Defense-in-breadth strategy Correct!
11/17/2019Module 4 Quiz - Communication and Network Security: Information Security.Fall20192/17Radio frequency identification (RFID) technologies are used in supplychain systems which, in turn, use defense-in-breadth strategy forensuring security. Defense-in-depth strategy considers layereddefenses to make security stronger. Defense-in-time strategyconsiders different time zones in the world where information systemsoperate. Defense-in-technology strategy deals with makingtechnology less complicated and more secure.0 / 4 ptsQuestion 2Communications between computers can take several approaches. Which ofthe following approaches is most secure?orrect Answerorrect AnswerYou AnsweredYou Answered4 / 4 ptsQuestion 3
11/17/2019Module 4 Quiz - Communication and Network Security: Information Security.Fall20193/17