Category IS5403

IS5403 Week

LAB 1 CER Speech recognition PBKDF2 Cell Phones Weight LAB 2 DAC MAC RBAC MAC LAB 3 Playbook Isolation UAC Administrator password 1.Which of the following is considered as the root of the Active Directory hierarchy? Forest 2.Multi-factor authentication involves…

IS5403-new-week-4

Wi-Fi Pineapple 2. Which of the following attack is also known as DNS spoofing? DNS poisoning 3. Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply] Nemesy DAVOSET UDP Flooder…

IS5403 Week 4 All Quizw

1.Both DNS poisoning and ARP poisoning involves:Spoofing 2.Which of the following statements are true about client-side DNS? (Choose all that apply).The Root Hints file has the IP addresses of the 13 root DNS serversCheck out DNS settings using the NSLookup…

IS5403 New Week 5

Intel Mash MakerGoogle App EngineMicrosoft Azure 2. Which of the following provides services, maintains the infrastructure, and provides security in a cloud environment? Cloud Service Provider 3. Which of the following entities is contracted to manage the network, servers, and…

IS5403 Week 8 Quiz

Document the mistake and workaround the problem. 2. When data is collected for a forensic investigation, what order should be followed? Order of volatility 3. Along with the forensic investigation effort, the man hours and expense should not be tracked…

IS5403 Week 8 Post Assessment

script kiddie 2. An Advanced Persistent Threat is most commonly associated with what type of threat actor? nation state actors 3. How is confidentiality ensured using the IPsec VPN protocol? By using the Encapsulating Security Payload (ESP) protocol. 4. What…

IS5403 Week 5 All Quizezz

1.Which of the following is usually bundled as a hidden component of a freeware? Spyware 2.Which of the following are characteristics of spyware? (Choose all that apply.) Secretly collects information about users Negatively affects confidentiality Negatively affects availably Tracking cookies…

IS5403 Week 6 all Quizezz

1.Which of the following aims to support distributed authentication and authorization over the Internet? Federation services 2.In Windows network, transitive trust is used among the different domains inside a forest for implementing: Authentication 3.In which of the following types of…

IS5403 Week 7 All Quizezz

1.What will be the available drive space in a RAID 5 configured system with 3 250GB hard drives? 500 GB 2.Which RAID types would use a minimum of four hard drives? (Choose all that apply). 610 3.What are some common…

IS5403 Week 1 Quizezz

Advanced Persistent Threat (APT) 2. Which of the following is an enterprise critical asset? Information 3. Which of the following is NOT a successive layer in which information security is achieved? Purposes 4. Ian recently earned his security certification and…