Chp 2 Test Cit370

20 Questions  I  By Jpeter89
CHP 2 Test CIT370
This is a quiz to text your knowledge in security of networking. It is for the CIT370 course.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.    Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
A.
B.
C.
D.
2.  A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
A.
B.
C.
D.
3.  Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
A.
B.
4.  A ____ outlines the major security considerations for a system and becomes the starting point for solid security.
A.
B.
C.
D.
5.  In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
A.
B.
C.
D.
6.  Keyed entry locks are much more difficult to defeat than deadbolt locks.
A.
B.
7.  Securing a restricted area by erecting a barrier is called ____.
A.
B.
C.
D.
8.  Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.
A.
B.
9.  ____ can be prewired for electrical power as well as wired network connections.
A.
B.
C.
D.
10.  A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
A.
B.
C.
D.
11.  A ____ is software that is a cumulative package of all security updates plus additional features.
A.
B.
C.
D.
12.  ____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
A.
B.
C.
D.
13.  ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.        
A.
B.
C.
D.
14.  A ____ is designed to separate a nonsecured area from a secured area.
A.
B.
C.
D.
15.  An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing.
A.
B.
C.
D.
16.  A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
A.
B.
C.
D.
17.  ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
A.
B.
C.
D.
18.  When a policy violation is detected by the DLP agent, it is reported back to the DLP server.
A.
B.
19.  ____ is defined as a security analysis of the transaction within its approved context.
A.
B.
C.
D.
20.  The signal from an ID badge is detected as the owner moves near a ____, which receives the signal.
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz