IS5403 Week

LAB 1

CER

Speech recognition

PBKDF2

Cell Phones

Weight

LAB 2

DAC

MAC

RBAC

MAC

LAB 3

Playbook

Isolation

UAC

Administrator password

1.Which of the following is considered as the root of the Active Directory hierarchy?

Forest

2.Multi-factor authentication involves how many minimum methods to authenticate a user?

2

3.Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes?

Facial

4.Which of the following factor is critical in the Gait analysis?

Way of walking

5.Which of the following is required for two-factor authentication? [Choose all that apply]

Password key
Password
Smart card

6.Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Encryption Keys Management
Key Exchange
Encryption and Decryption
Cryptographic function offloading from a server

7.Which of the following protocol uses port-based authentication?

802.1X

8.How many entities are involved in the 802.1x authentication process?

3

9.Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

10.Which type of incident response team is made up of experts who have other duties?

Virtual Team

11.Which of the following refers to a duplicate of the organization’s current data center?

Hot Site

12.Which team is dedicated only to incident response?

Permanent Team

13.Which of the following contains all the required hardware and connectivity to restore services?

Warm Site

14.Which of the following provides the plan for systems, networks, and major application recovery after disruptions?

IT Contingency Plan

15.Which of the following identifies the individuals to communicate with external entities?

Crisis Communication Plan

16.Which of the following plan focuses on malware, hackers, intrusions, attacks, and other security issues?

Cyber Incident response plan

17.Which of the following tool would you use to scan a Web application for vulnerabilities?

Nikto

18.In a Syslog implementation, which of the following component is an agent that collects the information from various devices and servers on the network?

Syslog Forwarder

19.Which of the following tasks can be performed by the NXLog tool? [Choose all that apply]

Classify events
Forward events
Correlate events
Store events

20.In an Email, which of the following are metadata? [Choose all that apply]

Sender
Subject
Date
Recipient

21.Which of the following statements describes the core purpose of using Tcpdump?

Capture data packets on a network

22.Which of the following can be considered as Personally identifiable information? [Choose all that apply]

Driver’s license number
Health insurance information
Social Security number
Medical records

23.Which of the following hashing algorithm is the common standard used for generating digital signatures?

SHA

24.How many steps are involved in the forensic investigation process?

7

25.Which type of evidence collection methods can be used when litigation might be needed? [Choose all that apply]

Chain of custody
Legal hold

Other Links:

Statistics Quiz


Networking Quiz


See other websites for quiz:

Check on QUIZLET


Check on CHEGG
















Leave a Reply

Your email address will not be published. Required fields are marked *