Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

D430: Section 5 - Knowledge Checks + Practice Quiz with Accurate Answers, Exams of Computer Science

D430: Section 5 - Knowledge Checks + Practice Quiz with Accurate Answers

Typology: Exams

2024/2025

Available from 07/14/2025

locaz-turus-1
locaz-turus-1 🇺🇸

3.4K documents

1 / 5

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
D430: Section 5 - Knowledge Checks +
Practice Quiz with Accurate Answers
What are two advantage of flash media over traditional magnetic media?
A) Speed
B) Security
C) Storage
D) Cost correct answer A) Speed
D) Cost
What are two advantages of using VPNs?
A) Accessing data on secure network from a remote site
B) Network intrusion detection
C) Sending sensitive traffic over unsecured networks
D) Network segmentation correct answer A) Accessing data on secure network
from a remote site
C) Sending sensitive traffic over unsecured networks
What are two considerations when choosing a location for a data center?
A) Natural disaster
B) Access to free wireless internet
C) Stable utilities
D) Access to the interstate highway system correct answer A) Natural disaster
C) Stable utilities
pf3
pf4
pf5

Partial preview of the text

Download D430: Section 5 - Knowledge Checks + Practice Quiz with Accurate Answers and more Exams Computer Science in PDF only on Docsity!

D430: Section 5 - Knowledge Checks +

Practice Quiz with Accurate Answers

What are two advantage of flash media over traditional magnetic media? A) Speed B) Security C) Storage D) Cost correct answer A) Speed D) Cost What are two advantages of using VPNs? A) Accessing data on secure network from a remote site B) Network intrusion detection C) Sending sensitive traffic over unsecured networks D) Network segmentation correct answer A) Accessing data on secure network from a remote site C) Sending sensitive traffic over unsecured networks What are two considerations when choosing a location for a data center? A) Natural disaster B) Access to free wireless internet C) Stable utilities D) Access to the interstate highway system correct answer A) Natural disaster C) Stable utilities

What are two main methods of an IDS? A) Host-based B) Signature-based C) Network-based D) Anomaly-based correct answer B) Signature-based D) Anomaly-based What is a major category of physical threats? A) Malware B) Phishing C) Gases D) Spillage correct answer C) Gases What is a protocol for securing communications? A) SSH B) HTML C) POP D) FTP correct answer A) SSH What is a wireless protocol? A) RC B) WPA C) POP D) AES correct answer B) WPA

C) Disaster recovery D) Data security standard correct answer C) Disaster recovery Which term is used to define leftover information after erasing a hard drive? A) Residual impact B) Residual risk C) Residual vulnerability D) Residual data correct answer D) Residual data Which type of asset control reports undesirable events? A) Alerting B) Preventative C) Deterrent D) Detective correct answer D) Detective Which type of controls employ measures such as policies, procedures, and guidelines to protect people? A) Network security tools B) Physical security C) Virtual private network D) Administrative correct answer D) Administrative Which type of firewall monitors and defends a system based on traffic patterns over a given connection? A) Proxy servers

B) Deep packet C) DMZ D) Stateful packet correct answer D) Stateful packet Which type of intrusion detection system (IDS) compares the present state of traffic to a baseline measurement of normal data to detect unusual traffic patterns? A) Network mapper B) Secure shell C)Anomaly-based D) Signature-based correct answer C)Anomaly-based Which type of media stores data on nonvolatile memory chips? A) Flash B) Magnetic C) Internet D) Optical correct answer A) Flash Which type of security control is a video surveillance system? A) Proactive B) Detective C) Preventive D) Deterrent correct answer B) Detective