CSCI 501 Quizzes

CSCI 501 Quizzes Liberty

  1. Which network tool recognizes common networking-related security problems and reports the problems without actually exploiting them?
  2. Which of the following type of program is also commonly referred to as a Trojan horse?
  3. Which type of virus targets computer hardware and software startup functions?
  4. Which attack exploits a vulnerability in Domain Name System (DNS) server software?
  5. Which of the following is the strongest form of wireless security and is easy to implement?
  6. Which type of virus uses a number of techniques to conceal itself from users and from detection software, and can hide the fact that an infected file is bigger than it used to be?
  7. Identify the OSI reference model layer that handles end-to-end communication maintenance.
  8. Which defense-in-depth layer involves the use of chokepoints?
  9. A(n) is a network of compromised computers that attackers use to launch attacks and spread malware.
  10. Which firewall topology supports the implementation of a DMZ?
  11. Identify the OSI reference model layer that deals with physical addressing and LAN delivery. Flow control and error checking take place at this layer.
  12. Which of the following helps reduce network eavesdropping?
  13. What does a “screened subnet” refer to?
  14. Which of the following is a TCP/IP protocol that provides a computer with an IP address, subnet mask, and other essential communication information?
  15. Which of the following would you not expect to find on a large network?
  16. How do worms propagate to other systems?
  17. Which of the following is not a form of Wi-Fi encryption?
  18. A(n) is a network of compromised computers that attackers use to launch attacks and spread malware.
  19. List the three major VPN technologies in use today, and define one of them.
  20. Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
  21. Which one of the following is NOT a market driver for the Internet of Things (IoT)?
  22. “With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN’s current network?”
  23. “Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If correct, which one of the tenets of information security did this attack violate?”
  24. Which one of the following is typically used during the identification phase of a remote access connection?
  25. What is NOT a common endpoint for a virtual private network (VPN) connection used for remote network access?
  26. Which element of the security policy framework requires approval from upper management and applies to the entire organization?
  27. Which risk is most effectively mitigated by an upstream Internet service provider (ISP)?
  28. What is the difference between information security and information systems security?
  29. List three UC application types supported by session initiation protocol (SIP).
  30. Which of the following is not a common threat to the tenets of C-I-A?
  31. Which domain of a typical IT infrastructure is primarily affected by weak endpoint security on *a. VPN client?
  32. You have determined that the cost of an encrypted network connection between your internal database server and internal application server outweighs the likelihood of an attacker accessing the network connection. Which risk management technique are you most likely to use?
  33. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm?
  34. What is accomplished during the response-planning step in a risk management process?
  35. Which of the following uses relative ranking to determine risk responses?
  36. Which tool helps you ensure your organization is satisfying its security policies?
  37. Which of the following terms refers to the likelihood of exposure to danger?
  38. Write out what the acronyms BCP and DRP stand for, and explain the difference between them.
  39. Explain what happens during a replay attack.
  40. Regarding access control policy management, which of the following is not considered a central element of access?
  41. What is a degausser used for?
  42. Which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition?
  43. Which of the following is a type of authentication?
  44. Of the following types of biometrics, which one has the longest response time and is therefore not popular in everyday use?
  45. Which of the following types of authentication is the oldest and most common method but also the weakest?
  46. Which of the following is not a primary type of authentication?
  47. Which type of biometrics measures dwell time and flight time, and lends itself well to two-factor authentication?
  48. Which access control model was designed for use in business and prohibits authorized users from making improper changes?
  49. List the four parts of access control, and define two of them.
  50. Which of the following is the likelihood that something bad will happen to an asset?
  51. What is a characteristic of analog communications?
  52. What is the result of the risk identification step in a risk management process?
  53. What is typically the first step in a risk management process?
  54. Which of the following is an action that could damage an asset?
  55. Which technology of the following supports the convergence of voice, video, and data communication streams across a split channel?
  56. Which of the following uses mathematical formulas and numbers to rank risk severity?
  57. Which of the following is an example of a store-and-forward communication?
  58. The key to protecting assets from the risk of attack is to eliminate or address as many as possible.
  59. A scammer posing as an IT support technician sends an e-mail to several employees at a credit union. The e-mail prompts for a logon ID and password to the company server. What type of attack is being described?
  60. What is a primary benefit of frame relay?
  61. You are configuring several smartphones for access to the company’s internal network via the Internet. Which IT domain is most affected?
  62. What is a characteristic of VoIP?
  63. Regarding a disaster recovery plan, which of the following takes the least amount of switchover time?
  64. An AUP is part of a layered approach to security and it supports confidentiality. What else supports confidentiality?
  65. A(n) provides a consistent definition for how an organization should handle and secure different types of data.
  66. In which domain of a typical IT infrastructure do service level agreements (SLAs) figure prominently?
  67. Which of the following should be the first priority in any business continuity plan?
  68. Which of the following is the most important part of successfully transitioning from a brick-and-mortar business to an e-commerce business?
  69. Which of the following is not a type of disaster recovery plan test?
  70. Which law requires all types of financial institutions to protect customers’ private financial information?
  71. Which of the following is usually associated with a phishing Web site?
  72. Which networking technology was the first mainstream method for connecting to the Internet?
  73. Instructions for responding to the following would be included in an organization’s BCP but not a DRP.
  74. What is phreaking most often associated with?
  75. What is the risk equation?
  76. Which type of attack involves capturing data packets from a network and retransmitting them to produce an unauthorized effect?
  77. In which type of attack does a person, program, or computer disguise itself as another person, program, or computer to gain access to a resource?
  78. What tenet of information systems security is concerned with the recovery time objective (RTO)?
  79. Write out the risk equation.

 

  1. List three techniques or policies that can be used to reduce the impact of social engineering attacks at an organization.
  2. Explain why software manufacturers require the End User License Agreement (EULA).
  3. Which of the following provides best practices for IT management and was created for ISA, ISACA, and ITGI?
  4. Identify a drawback of log monitoring.
  5. During a security audit, for what reason does an auditor review risk analysis output?
  6. Which of the following is a process for verifying policy compliance?
  7. Which of the following is not a general category of data permission level?
  8. During a security audit, for what reason does an auditor review host logs?
  9. When defining an audit plan for IT security, what is the first step that must be done?
  10. What is a characteristic of a hardened computer or device?
  11. Provide an example of both a real-time monitoring tool and a non-real-time monitoring tool.
  12. List the four most common permission levels, and define two.
  13. Which of the following is generally not a type of emerging threat?
  14. You have 50 computers that are valued at $1,000 each. You lose three computers each year to theft. You can purchase computer locks for each computer that cost $10 each, reducing the number of computers lost to theft each year to one. What is the ARO if you purchase and install the locks?
  15. Identify a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
  16. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation?
  17. Which of the following helps keep critical business processes running during a disaster?
  18. In which type of cipher attack does the cryptanalyst have access only to a segment of encrypted data, and has no choice as to what that data may be. An example is the cryptogram in some daily newspapers.
  19. Which of the following is a specific type of countermeasure?
  20. What is a common reason for not completely eliminating a risk?
  21. List the four security goals of cryptography.
  22. List the four basic forms of cryptographic attack.
$3.99
Buy Answer Key

has been added to your cart!

have been added to your cart!

Files Included - Liberty University
  1. CSCI 501 Quizzes