



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
D430: Section 5 - Knowledge Checks + Practice Quiz with Accurate Answers
Typology: Exams
1 / 5
This page cannot be seen from the preview
Don't miss anything!
What are two advantage of flash media over traditional magnetic media? A) Speed B) Security C) Storage D) Cost correct answer A) Speed D) Cost What are two advantages of using VPNs? A) Accessing data on secure network from a remote site B) Network intrusion detection C) Sending sensitive traffic over unsecured networks D) Network segmentation correct answer A) Accessing data on secure network from a remote site C) Sending sensitive traffic over unsecured networks What are two considerations when choosing a location for a data center? A) Natural disaster B) Access to free wireless internet C) Stable utilities D) Access to the interstate highway system correct answer A) Natural disaster C) Stable utilities
What are two main methods of an IDS? A) Host-based B) Signature-based C) Network-based D) Anomaly-based correct answer B) Signature-based D) Anomaly-based What is a major category of physical threats? A) Malware B) Phishing C) Gases D) Spillage correct answer C) Gases What is a protocol for securing communications? A) SSH B) HTML C) POP D) FTP correct answer A) SSH What is a wireless protocol? A) RC B) WPA C) POP D) AES correct answer B) WPA
C) Disaster recovery D) Data security standard correct answer C) Disaster recovery Which term is used to define leftover information after erasing a hard drive? A) Residual impact B) Residual risk C) Residual vulnerability D) Residual data correct answer D) Residual data Which type of asset control reports undesirable events? A) Alerting B) Preventative C) Deterrent D) Detective correct answer D) Detective Which type of controls employ measures such as policies, procedures, and guidelines to protect people? A) Network security tools B) Physical security C) Virtual private network D) Administrative correct answer D) Administrative Which type of firewall monitors and defends a system based on traffic patterns over a given connection? A) Proxy servers
B) Deep packet C) DMZ D) Stateful packet correct answer D) Stateful packet Which type of intrusion detection system (IDS) compares the present state of traffic to a baseline measurement of normal data to detect unusual traffic patterns? A) Network mapper B) Secure shell C)Anomaly-based D) Signature-based correct answer C)Anomaly-based Which type of media stores data on nonvolatile memory chips? A) Flash B) Magnetic C) Internet D) Optical correct answer A) Flash Which type of security control is a video surveillance system? A) Proactive B) Detective C) Preventive D) Deterrent correct answer B) Detective