среда, 11 ноября 2015 г.

CIS 333 WEEK 1 QUIZ


  • Question 1
1 out of 1 points
  
 
The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site.
Answer
   

 
   
  • Question 2
1 out of 1 points
  
 
____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.
Answer
   

 
   
  • Question 3
1 out of 1 points
  
 
A ________ examines the network layer address and routes packets based on routing protocol path determination decisions.
Answer
   

 
   
  • Question 4
1 out of 1 points
  
 
____________ is the practice of hiding data and keeping it away from unauthorized users.
Answer
   

 
   
  • Question 5
1 out of 1 points
  
 
A ________ is a collection of computers connected to one another or to a common connection medium.
Answer
   

 
   
  • Question 6
1 out of 1 points
  
 
The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists.
Answer
   

 
   
  • Question 7
1 out of 1 points
  
 
Connecting your computers or devices to the ________ immediately exposes them to attack.
Answer
   

 
   
  • Question 8
1 out of 1 points
  
 
With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a _____________.
Answer
   

 
   
  • Question 9
0 out of 1 points
  
 
Which of the following is the definition of ciphertext?
Answer
   

 
   
  • Question 10
1 out of 1 points
  
 
A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.
Answer
   

 
   
  • Question 11
1 out of 1 points
  
 
What fills security gaps and software weaknesses?
Answer
   

 
   
  • Question 12
1 out of 1 points
  
 
Software vendors must protect themselves from the liabilities of their own vulnerabilities with a(n) ____________.
Answer
   

 
   
  • Question 13
1 out of 1 points
  
 
What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens’ private data and have proper security controls in place?
Answer
   

 
   
  • Question 14
1 out of 1 points
  
 
___________ is the process of transforming data from cleartext into ciphertext.
Answer
   

 
   
  • Question 15
1 out of 1 points
  
 
___________ is the duty of every government that wants to ensure its national security.
Answer
   

 
   
  • Question 16
1 out of 1 points
  
 
What name is given to an exterior network that acts as a buffer zone between the public Internet and an organization’s IT infrastructure (i.e., LAN-to-WAN Domain)?
Answer
   

 
   
  • Question 17
1 out of 1 points
  
 
Today, people working in cyberspace must deal with new and constantly evolving ________.
Answer
   

 
   
  • Question 18
1 out of 1 points
  
 
The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media.
Answer
   

 
   
  • Question 19
1 out of 1 points
  
 
The ________ is where the fourth layer of defense is required.
Answer
   

 
   
  • Question 20
0 out of 1 points
  
 
The requirement to keep information private or secret is the definition of __________.
Answer

Комментариев нет:

Отправить комментарий