Module 5: Security Post-test

50 Questions | Total Attempts: 78

SettingsSettingsSettings
Module 5: Security Post-test - Quiz

IBL #10 for Joey Squires, Logan Aday and James Linz over Security in Information Technology.


Questions and Answers
  • 1. 
    What is a multi-factor authentication? 23.2.2
    • A. 

      A. A type of authentication that involves solving math problems.

    • B. 

      B. Authentication that requires multiple types of input.

    • C. 

      C. A password that has alphabetical and numerical characters.

  • 2. 
    Why are hashing algorithms more secure? 23.2.5
    • A. 

      A. They're a type of encryption.

    • B. 

      B. They are completely randomized.

    • C. 

      C. They cannot be hacked.

  • 3. 
    Which wireless signal has the 5 GHz band? 25.1.2
    • A. 

      A. 802.11g

    • B. 

      B. 802.11a

    • C. 

      C. 802.11n

  • 4. 
    Why use wireless connection? 25.1.5
    • A. 

      A. Distance is too far for wired.

    • B. 

      B. Wireless is more secure.

    • C. 

      C. Wireless is more reliable.

  • 5. 
    Can wireless G penetrate a concrete, underground bunker? 25.1.3
    • A. 

      A. Yes

    • B. 

      B. No

  • 6. 
    Which protocol has the highest bandwidth? 25.1.1
    • A. 

      A. 802.11g

    • B. 

      B. 802.11a

    • C. 

      C. 802.11b

  • 7. 
    How does wireless help society? 25.1.4
    • A. 

      A. Increases communication.

    • B. 

      B. Allows more confusion.

    • C. 

      C. Makes wired connection obsolete.

  • 8. 
    Which encryption method is most secure? 24.4.2
    • A. 

      A. Hashing algorithms.

    • B. 

      B. Salted hashes.

    • C. 

      C. Blowfish.

  • 9. 
    What is the point of a site having a Certification Authority? 24.4.5
    • A. 

      A. They can tell you what to do.

    • B. 

      B. The site gets money from the sponsor.

    • C. 

      C. It shows the site can be trusted with data.

  • 10. 
    What benefits does using Tunneling Protocol offer? 24.4.1
    • A. 

      A. Flexibility.

    • B. 

      B. Scalability.

    • C. 

      C. Both A and B.

  • 11. 
    How does Tunneling Protocol affect VPNs? 24.4.3
    • A. 

      A. Allows users to connect to the internet and tunnel back to company resources.

    • B. 

      B. Creates new IPs to make the network more organized.

    • C. 

      C. Locks out unapproved IPs from connecting.

  • 12. 
    My computer has Anti-virus and Anti-spyware, am I safe? 23.1.2
    • A. 

      A. Yes.

    • B. 

      B. No.

  • 13. 
    Which of the following is most dangerous? 23.1.8
    • A. 

      A. Network worm.

    • B. 

      B. Trojan.

    • C. 

      C. Keylogger.

  • 14. 
    Which of the following is a trusted certification? 23.1.10
    • A. 

      A. AFT

    • B. 

      B. CJI

    • C. 

      C. IBM

  • 15. 
    Why is a confidentiality contract necessary? 23.1.6
    • A. 

      A. Workers may leak confidential details.

    • B. 

      B. Use more paper.

    • C. 

      C. Both A and B.

  • 16. 
    How is a government supposed to aid in developing new standards? 23.1.3
    • A. 

      A. Waiting until it is absolutely necessary for new standards.

    • B. 

      B. Listen to big companies to know when to develop them.

    • C. 

      C. Develop standards as the need begins to arise.

  • 17. 
    Why has the need for data assurance been on the rise? 23.1.4
    • A. 

      A. More networks.

    • B. 

      B. More people after the data.

    • C. 

      C. Both A and B.

  • 18. 
    What makes a computer most unsafe? 23.1.1
    • A. 

      A. Malicious sites.

    • B. 

      B. Unaware user.

    • C. 

      C. Infected downloads.

  • 19. 
    What is non-repudiation? 23.1.7
    • A. 

      A. A site doesn't allow validity to be challenged.

    • B. 

      B. A malicious site.

    • C. 

      C. A site that sells anti-virus.

  • 20. 
    What is a government, industry, and academia partnership? 23.1.9
    • A. 

      A. Representatives from government, industry, and high education working together.

    • B. 

      B. Representatives from government, industry, and high education debating.

    • C. 

      C. Both A and B.

  • 21. 
    Why is data theft illegal? 23.1.5
    • A. 

      A. Invasion of privacy.

    • B. 

      B. Invasion of other peoples' rights.

    • C. 

      C. Both A and B.

  • 22. 
    What is a biometric system? 23.2.1
    • A. 

      A. Fingerprinting.

    • B. 

      B. Password accounts.

    • C. 

      C. IP check.

  • 23. 
    What is a hashing algorithm? 23.2.5
    • A. 

      A. A form of password encryption.

    • B. 

      B. A math equation.

    • C. 

      C. A cooking recipe.

  • 24. 
    Digital certifications on information assurance are a waste of time to check. 23.2.4
    • A. 

      True.

    • B. 

      False.

  • 25. 
    If employees disclose personal customer information, what action should be taken? 23.2.6
    • A. 

      A. Fired.

    • B. 

      B. Reprimanded.

    • C. 

      C. No action.

Back to Top Back to top