Question 1.1. (TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? (Points : 4)
Question 2.2. (TCO 5) Two tools that can be used to encrypt e-mail are _____. (Points : 4)
Question 3.3. (TCO 5) All of the following techniques help secure IM communications except _____. (Points : 4)
Question 4.4. (TCO 6) What is the name of the process that controls the access to information based on the sensitivity of that information, whether or not the user operates at the appropriate sensitivity level, and whether the user has the authority to access that information? (Points : 4)
Question 5.5. (TCO 6) The access-control model that most closely resembles an organization's structure is _____. (Points : 4)
Question 6.6. (TCO 6) Running Java applets from the Web on your system is considered _____. (Points : 4)
Question 7.7. (TCO 6) Which is more secure? (Points : 4)
Question 8.8. (TCO 6) Which of the following does not enhance the security of the browser? (Points : 4)
Question 9.9. (TCO 6) Your boss wants you to make company files available to the general public, but she does not want you to have to create user accounts for anyone who wants access to the file transfer. In this case, you should use _____. (Points : 4)
Question 10.10. (TCO 2) What are the security risks of installing games on an organization's system? (Points : 4)
Question 11.11. (TCO 2) Which of the following is the weakest password? (Points : 4)
Question 12.12. (TCO 8) The law that regulates unsolicited, commercial e-mail is the _____. (Points : 4)
Question 13.13. (TCO 4) Which of the following is not one of the three forms of trust models? (Points : 4)
Question 14.14. (TCO 4) Once you have properly obtained a digital certificate for a website, _____. (Points : 4)
Question 15.15. (TCO 2) PGP uses _____. (Points : 4)
Question 16.16. (TCO 2) HTTPS uses port _____. (Points : 4)
Question 17.17. (TCO 3) Which Transport Layer protocol is connection oriented? (Points : 4)
Question 18.18. (TCO 3) Which protocol is responsible for resolving an IP address to a MAC address? (Points : 4)
Question 19.19. (TCO 3) Which of the following is a valid IP address? (Points : 4)
Question 20.20. (TCO 3) The series of worldwide, interconnected networks is referred to as the _____. (Points : 4)
Question 21.21. (TCO 3) The network that is an extension of a selected portion of a company's Intranet to external partners is referred to as the _____. (Points : 4)
Question 22.22. (TCO 6) You are building a network and need to connect five computers in an office. They will be on the same network segment, and you should be able to perform some security functions, such as port address security. What device would you use to connect the computers? (Points : 4)
Question 23.23. (TCO 6) The following are steps in securing a workstation except _____. (Points : 4)
Question 24.24. (TCO 6) Which device converts analog signals to digital signals and vice versa? (Points : 4)
Question 25.25. (TCO 6) Which of the following types of access controls would you use to grant permissions based on the decision of the owner of an object? (Points : 4)
1.) Write a password policy that your company will have to follow to ensure strong passwords.
2.) What is NAT, and what is it used for?
3.) How does PGP works??
4.) List and describe three types of network topologies.
7.) Explain some of the problems with PGP.
9.) What are the four common methods for connecting equipment at the Physical Layer?
13.) What are the different methods of access management (MAC, DAC, and RBAC)?
14.) What are the essential elements of change management?
15.) What laws govern computer access and trespass?