It255 Quiz 2

In: Computers and Technology

Submitted By sdot711
Words 394
Pages 2
IT255 Intro to Info Security
June 2012
Quiz 2

Name: Date: 08/21/2012

1. Which of the following are primary categories of rules that most organizations must comply with?
a. HR and employee
b. Regulatory and employee
c. Organizational and technological
d. Regulatory and organizational

2. Which of the following is not a part of an ordinary IT security policy framework?
a. Specifications
b. Standards
c. Procedures
d. Guidelines

3. Which of the following helps you determine the appropriate access to classified data?
a. Job rotation
b. Need to know
c. Code of ethics
d. Change control management

4. Which of the following refers to the management of baseline settings for a system device?
a. Baseline standards control
b. Configuration control
c. Change control
d. Hardware asset control

5. Identify a primary step of the SDLC.
a. Budget review
b. Design
c. Replication
d. Marketing

6. Which of the following is a process to verify policy compliance?
a. Penetration test
b. Security audit
c. Threat mitigation
d. Security assessment

7. When monitoring a system for anomalies, the system is measured against __________.
a. Baseline
b. Logs
c. Security policy
d. Results of the penetration test

8. Which of the following is not a type of penetration test?
a. Black box
b. White box
c. Gray box
d. Blue box

9. Identify a drawback of log monitoring.
a. Amount of information
b. Specialized tools requirements
c. Accuracy of information
d. Auditing requirements

10. Which of the following is not a type of monitoring device?
a. Firewall
b. Server log
c. IPS
d. NIPS

11. Identify the primary components of risk management.
a. Reduction, stabilization, and mitigation
b. Avoidance, reduction, and stabilization
c. Reduction, avoidance, and mitigation
d. Stabilization, avoidance, and reduction

12. Which of…...

Similar Documents

It255 Unit 9 Assignment 2

...Carlos Espiritu Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1:   Passive and Active Reconnaissance Passive reconnaissance:   This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work.   It can also be the result of researching the company through the internet via search engines. Active Reconnaissance:   This is the process of actually scanning the network to find out IP address and services that the network provides.   This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using.   This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers.   This can result in getting information such as the user accounts, IP addresses and   computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access.   There are several ways to do this such as......

Words: 316 - Pages: 2

Quiz 2

...ACCT 410 Quiz 2 – Name of Student: ___Abraham Vanega_____________ Ch 7 8 9 10 – 16 Questions 1. Several years ago a not for profit organization received a $1 million donation. The income from this donation is restricted to support program activities related to the mission of the organization. During the current year the endowment earned $40,000 of interest revenues. The organization designated $30,000 to support program activities. * a. On its year-end statement of activities, the organization would report interest revenues of * * * _________$40,000_________________ * b. On its year-end statement of financial position, the organization would report temporarily restricted net assets of * * _________$40,000_________________ * c. On its year-end statement of financial position, the organization would report permanently restricted net assets of: _______$1000,000__________________ 2. A city sold a piece of equipment for $8,000. The equipment had an original cost of $10,000 and now has a fair value of $5,000. Assuming that the city maintains its books and records in a manner to facilitate the preparation of the fund financial statements, what is the appropriate entry in the general fund to record this sale? Cash $8000 Other financing Sources -Sale of Asset $8000 3. The city of Raleigh acquired a new piece of equipment, paying $1,000 cash from the general fund...

Words: 1320 - Pages: 6

Quiz 2

...from your instructor, are in the "Details" section below. Date Taken: 2/15/2014 Time Spent: 2 h , 12 min , 10 secs Points Received: 146 / 150 (97.3%) Question Type: # Of Questions: # Correct: Short 9 N/A Grade Details - All Questions Question 1. Question : (TCO F) The size of the labor force in a community is 500, and 400 of these folks are gainfully employed. In this community, 100 people over the age of 16 do not have a job and are not looking for work. In addition, 200 people in the community are under the age of 16. The unemployment rate is ______. Student Answer: Unemployed rate = (unemployed / labor force)x100 it is said labor force is 500 and 400 are employed, we don't need to substract number under 16, number of institutionized adults and number not looking for work.Therefore 500 - 400 = 100 unemployed and the unemployed rate would be (100 / 500)x100 = 20% Instructor Explanation: The unemployment rate is calculated by dividing the number of unemployed by the labor force. The labor force is calculated by subtracting three things from the population (# under 16, # of institutionalized adults, and # not looking for work). In this example, you are given the size of the labor force (500), and you are also told that 400 are employed. Therefore, 100 are unemployed, and the unemployment rate is simply 100/500 or 20%. Points Received: 15 of 15 Comments: Question 2. Question : TCO F) Suppose nominal GDP in 2005 was $11......

Words: 1815 - Pages: 8

Mat 540 Quiz 2

...Submission: Quiz 2 Review Test Submission: Quiz 2 User Course Test Started Submitted Status Quantitative Methods Quiz 2 Completed Attempt Score 30 out of 40 points Question 1 If two events are not mutually exclusive, then P(A or B) = P(A) + P(B) Selected Answer: Correct Answer: False False 2 out of 2 points Question 2 Probability trees are used only to compute conditional probabilities. Selected Answer: Correct Answer: False False 2 out of 2 points Question 3 2 out of 2 points Seventy two percent of all observations fall within 1 standard deviation of the mean if the data is normally distributed. Selected Answer: Correct Answer: False False Question 4 2 out of 2 points Using the minimax regret criterion, we first construct a table of regrets. Subsequently, for each possible decision, we look across the states of nature and make a note of the maximum regret possible for that decision. We then pick the decision with the largest maximum regret. Selected Answer: Correct Answer: False False Question 5 The Hurwicz criterion is a compromise between the maximax and maximin criteria. Selected Answer: Correct Answer: True True 2 out of 2 points Question 6 The maximin approach involves choosing the alternative with the highest or lowest payoff. Selected Answer: Correct Answer: False False 2 out of 2 points Question 7 The minimin criterion is optimistic. Selected Answer: Correct Answer: True True 2 out of 2......

Words: 1073 - Pages: 5

Quiz 2

...* QUIZ 2 * * Question 1 

1 out of 1 points
 * | * | * | * If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
 | | * Selected Answer: | * True | | 1.TRUE | | | * * Question 2 

1 out of 1 points
 * | * | * | * The function of a repeater is to extend the range of an existing network.
 | | * Selected Answer: | * True | | 1.TRUE | | | * * Question 3 

1 out of 1 points
 * | * | * | * When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? * 
 | | * Selected Answer: | * a. switch | | A. SWITCH | | | * * Question 4 

1 out of 1 points
 * | * | * | * Why would you need to use a repeater? * 
 | | * Selected Answer: | * b. You need to add a group of computers to your network, and the distance is too far for normal means of communication. | | B. YOU NEED TO ADD A GROUP OF COMPUTERS TO YOUR NETWORK, AND THE DISTANCE IS TOO FAR FOR NORMAL MEANS OF COMMUNICATION | | | * * Question 5 

1 out of 1......

Words: 758 - Pages: 4

Quiz #2

...MAT540150NC021-1146-001 Quantitative Methods Week 3 Review Test Submission: Quiz 2 Skip to Course Content Skip to Top Frame Tabs Menu Management Options Expand All Collapse All Course Menu: MAT540150NC021-1146-001 (Quantitative Methods) Course Home Student Center Mobile Learn Announcements Email Gradebook ________________________________________ Class Introductions Week 1 Week 2 Week 3 Week 4 Week 5 Review Test Submission: Quiz 2 Skip to Course Menu Skip to Top Frame Tabs Content Instructions Question 1 2 out of 2 points If two events are not mutually exclusive, then P(A or B) = P(A) + P(B) Answer Selected Answer: False Correct Answer: False Question 2 2 out of 2 points Seventy two percent of all observations fall within 1 standard deviation of the mean if the data is normally distributed. Answer Selected Answer: False Correct Answer: False Question 3 2 out of 2 points Probability trees are used only to compute conditional probabilities. Answer Selected Answer: False Correct Answer: False Question 4 2 out of 2 points The Hurwicz criterion is a compromise between the maximax and maximin criteria. Answer Selected Answer: True Correct Answer: True Question 5 2 out of 2 points The equal likelihood criterion assigns a probability of 0.5 to each......

Words: 1202 - Pages: 5

Quiz 2

...Question 1 .2 out of 2 points Correct The Monetary Control Act: Answer Selected Answer: extended the Fed’s control to thrift institutions and non-member commercial banks Correct Answer: extended the Fed’s control to thrift institutions and non-member commercial banks . Question 2 .2 out of 2 points Correct Commercial banks obtain the bulk of their loanable funds from: Answer Selected Answer: depositors Correct Answer: depositors . Question 3 .2 out of 2 points Correct The holding-company device to control two or more commercial banks: Answer Selected Answer: has increased in importance in recent years Correct Answer: has increased in importance in recent years . Question 4 .2 out of 2 points Correct The primary purpose of this Act was to aid the savings and loan industry Answer Selected Answer: Garn–St. Germain Depository Institutions Act Correct Answer: Garn–St. Germain Depository Institutions Act . Question 5 .2 out of 2 points Correct The item on the liabilities and equity section of a bank’s balance sheet that represents the smallest proportion of bank’s assets is: Answer Selected Answer: owner’s capital Correct Answer: owner’s capital . Question 6 .2 out of 2 points Correct The Federal Deposit Insurance Corporation Improvement Act of 1991: Answer Selected Answer: required that failed banks be handled in such a way as to provide the lowest cost to the......

Words: 789 - Pages: 4

Acct 557 Quiz 2

...ACCT 557 Quiz 2 Purchase here http://chosecourses.com/ACCT%20557/acct-557-quiz-2 Product Description 1. (TCO B) As a result of differences between depreciation for financial reporting purposes and tax purposes, the financial reporting basis of Noor Co.'s sole depreciable asset, acquired in Year 1, exceeded its tax basis by $250,000 at December 31, Year 1. This difference will reverse in future years. The enacted tax rate is 30% for Year 1, and 40% for future years. Noor has no other temporary differences. In its December 31, Year 1, balance sheet, how should Noor report the deferred tax effect of this difference? 2. (TCO B) On its December 31, Year 2, balance sheet, Shin Co. had income taxes payable of $13,000 and a current deferred tax asset of $20,000 before determining the need for a valuation account. Shin had reported a current deferred tax asset of $15,000 at December 31, Year 1. No estimated tax payments were made during Year 2. At December 31, Year 2, Shin determined that it was more likely than not that 10% of the deferred tax asset would not be realized. In its Year 2 income statement, what amount should Shin report as total income tax expense? 3. (TCO B) Justification for the method of determining periodic deferred tax expense is based on the concept of: 4. (TCO B) In Year 2, Ajax, Inc. reported taxable income of $400,000 and pretax financial statement income of $300,000. The difference resulted from $60,000 of nondeductible premiums on......

Words: 366 - Pages: 2

Acct 557 Quiz 2

...ACCT 557 Quiz 2 Purchase here http://chosecourses.com/ACCT%20557/acct-557-quiz-2 Product Description 1. (TCO B) As a result of differences between depreciation for financial reporting purposes and tax purposes, the financial reporting basis of Noor Co.'s sole depreciable asset, acquired in Year 1, exceeded its tax basis by $250,000 at December 31, Year 1. This difference will reverse in future years. The enacted tax rate is 30% for Year 1, and 40% for future years. Noor has no other temporary differences. In its December 31, Year 1, balance sheet, how should Noor report the deferred tax effect of this difference? 2. (TCO B) On its December 31, Year 2, balance sheet, Shin Co. had income taxes payable of $13,000 and a current deferred tax asset of $20,000 before determining the need for a valuation account. Shin had reported a current deferred tax asset of $15,000 at December 31, Year 1. No estimated tax payments were made during Year 2. At December 31, Year 2, Shin determined that it was more likely than not that 10% of the deferred tax asset would not be realized. In its Year 2 income statement, what amount should Shin report as total income tax expense? 3. (TCO B) Justification for the method of determining periodic deferred tax expense is based on the concept of: 4. (TCO B) In Year 2, Ajax, Inc. reported taxable income of $400,000 and pretax financial statement income of $300,000. The difference resulted from $60,000 of nondeductible premiums on......

Words: 366 - Pages: 2

Scin 135 Quiz 2

...SCIN 135 Quiz 2 Click Link Below To Buy: http://hwcampus.com/shop/scin-135-quiz-2/ Question 1 of 40 0.0/ 2.5 Points Glucose can be used to make: A.disaccharides like maltose. B.starch. C.cellulose. D.all of the above Question 2 of 40 2.5/ 2.5 Points A form of vegetative reproduction that involves live branches being buried in the debris on the forest floor is called: A.burying B.sclerifying C.layering D.lining out Question 3 of 40 2.5/ 2.5 Points The wood borers are the most damaging insect pests in the North American forests. A. True B. False Question 4 of 40 2.5/ 2.5 Points White pine blister rust is an exotic disease introduced to the United States approximately 100 years ago. True False Question 5 of 40 2.5/ 2.5 Points Forested watersheds are ineffective biological filters and do not remove pollutants from water. True False Question 6 of 40 2.5/ 2.5 Points The chemical reaction that joins glucose molecules to form starch is hydrolysis synthesis. True False Question 7 of 40 2.5/ 2.5 Points Soil tests need to be conducted: A.before planting trees and at regular intervals until trees are harvested B.on representative sites within a tract C.both A and B Question 8 of 40 0.0/ 2.5 Points The soil horizon with the greatest amount of organic material is...

Words: 1096 - Pages: 5

Psyc 406 Quiz 2

...PSYC 406 Quiz 2 Click Link Below To Buy: http://hwaid.com/shop/psyc-406-quiz-2/ Question 1 of 17 2.0 Points In the journal article authored by Mittal and Walker (2007),__________ adolescents were considered at risk for psychosis, and of that number _________ participants converted to an Axis I psychosis over the _________ -year period. A.50; 6; 10 B.40; 10; 4 C.10; 2; 1 D.35; 10; 4 Question 2 of 17 2.0 Points According to Mittal and Walker (2007), neurocircuitry implicated in psychotic symptoms may be shared by: A.circuits controlling heart rate B.circuits controlling hearing Correct C.circuits controlling dyskinetic movement D.circuits controlling speech Question 3 of 17 2.0 Points Of interest to Mittal and Walker (2007) is the prediction of ______________ by assessing movement abnormalities. A.affective psychosis B.schizophrenia C.schizoaffective disorder D.dissociative fugue Question 4 of 17 2.0 Points Mittal and Walker (2007) assert the present findings support the theory that hyperkinesis and psychotic symptoms share neural mechanisms. A. True B. False Question 5 of 17 2.0 Points Consistent with the Mitall and Walker (2007 findings, the group that converted to Axis I psychosis exhibited significantly more movement in: A.feet and lower legs B.knee jerking motions C.face and upper body D.toes and fingers Question 6 of 17 2.0 Points The......

Words: 548 - Pages: 3

Psyc325 Week 2 Quiz 2

...PSYC325 Week 2 Quiz 2 Click Link Below To Buy: http://hwaid.com/shop/psyc325-week-2-quiz-2/ Biopsychology Question 1 of 12 1.0/ 1.0 Points The before-and-after design is often used to demonstrate A.contingent tolerance. B.metabolic tolerance. C.situationally specific tolerance. D.functional tolerance. Question 2 of 12 1.0/ 1.0 Points Much of what we believe about the biopsychology of drug addiction is based on the study of drug self-administration in laboratory animals, but there is a major concern: A.Most of the research has been based on opiate self-administration. B.Most of the research has been based on stimulant self-administration. C.The housing and testing conditions have been unnatural. D.both B and C Question 3 of 12 1.0/ 1.0 Points Which of the following seem to share some brain mechanisms with habitual drug taking? A.kleptomania B.overeating C.compulsive shopping D.all of the above Question 4 of 12 1.0/ 1.0 Points Recent research suggests that during the transition from initial drug taking to habitual drug taking. A.there are impairments in the function of prefrontal cortex. B.the control of drug taking is shifted from the nucleus accumbens. C.the control of drug taking is shifted to the dorsal striatum. D.all of the above Question 5 of 12 1.0/ 1.0 Points Each T cell has two kinds of receptors on its membrane: one for molecules normally......

Words: 588 - Pages: 3

Busi650 Quiz 2

...BUSI650 Quiz 2 Click Link Below To Buy: http://hwcampus.com/shop/busi650-quiz-2/ • 2 out of 2 points Developing and evaluating solutions to reduce the gap between desired process performance and current performance is the final step in the six sigma DMAIC approach for process improvement. Answer • Question 2 2 out of 2 points Six Sigma is better applied on manufacturing than service operations. Answer • Question 3 2 out of 2 points Which of the following is FALSE about Quality Function Deployment (QFD)? Answer • Question 4 0 out of 2 points With respect to strategy maps and balanced scorecards, which of the following is FALSE? Answer • Question 5 0 out of 2 points Which of the following is NOT an original component of reengineering? Answer • Question 6 0 out of 2 points Which of the following characteristics makes it EASIER to measure the quality of a service, relative to that of a product or facilitating good? Answer • Question 7 0 out of 2 points Defects per million opportunities (DPMO) and Process Sigma are the most important tools for the Measure Phase of Six Sigma. Answer • Question 8 0 out of 2 points The following are shortcomings associated with analyzing problems “one factor at a time” (also known as OFAT and 1FAT) EXCEPT: Answer • Question 9 0 out of 2 points ......

Words: 622 - Pages: 3

It255 Unit9 Assignemtn 2

...Unit 9 Assignment 2 Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1: Passive and Active Reconnaissance Passive reconnaissance: This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work. It can also be the result of researching the company through the internet via search engines. Active Reconnaissance: This is the process of actually scanning the network to find out IP address and services that the network provides. This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using. This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers. This can result in getting information such as the user accounts, IP addresses and computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access. There are several ways to do this such as......

Words: 343 - Pages: 2

Quiz 2

...[pic][pic][pic][pic][pic][pic][pic][pic][pic][pic]1. Current technology trends will result in (Points : 1)       [pic] IT organizations being more structured.       [pic] organizations with fewer levels of management.       [pic] an increased need for IT staffing.       [pic] an increased number of servers within an enterprise. [pic][pic][pic][pic] 2. The quality of ubiquity, as it relates to e-commerce, is illustrated by (Points : 1)       [pic] the same set of standards being used across the globe.       [pic] plentiful, cheap information.       [pic] the enabling of commerce worldwide.       [pic] the availability of Internet technology everywhere and anytime. [pic][pic][pic][pic] 3. The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as (Points : 1)       [pic] switching costs.       [pic] transaction costs.       [pic] procurement.       [pic] agency costs. [pic][pic][pic][pic] 4. The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached at which the additional inputs produce no additional output. This is referred to as (Points : 1)       [pic] the point of no return.       [pic] the law of diminishing returns.       [pic] supply and demand.       [pic] network inelasticity. [pic][pic][pic][pic] 5. Disintermediation (Points : 1)       [pic] results from the speed of the Internet.       [pic] is defined as the elimination of layers in...

Words: 465 - Pages: 2