Network Security Source 3
Network Security Source 3
Question 1
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Which of the following are the commands for disabling a port in a Network
Switch. Choose any that Apply
Select one:
a. Patch
b. Service pack
c. Security hot-fix
Feedback
Your answer is incorrect.
The correct answer is: Security hot-fix
Question 3
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
NTFS and FAT/FAT32 is an example of?
Answer:
Feedback
The correct answer is: File System
Question 4
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
This service is the one responsible for handling connections to a remote network
resources.
Select one:
a. Workstation service
b. Print Spooler service
c. Messenger service
d. Server service
Feedback
Your answer is incorrect.
The correct answer is: Workstation service
Question 5
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Two Categories of a Group Policy. Choose any that apply.
Answer:
Feedback
The correct answer is: Group Policy
Question 7
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Without this service on your environment, you won't be able to share any of your
resources
Select one:
a. Workstation service
b. Messenger service
c. Print Spooler service
d. Server service
Feedback
Your answer is incorrect.
The correct answer is: Server service
Question 8
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Which of the following are not part of the steps in order to harden your system.
Choose only one.
Select one:
a. Patch System
b. Disable Unnecessary Services
c. Uninstall Necessary Software
d. Disable or Remove Unnecessary Accounts
Feedback
Your answer is incorrect.
The correct answer is: Uninstall Necessary Software
Question 9
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Which of the following are the commands for disabling a port in a Network
Switch. Choose any that Apply
Select one:
a. Security baseline
b. Configuration Baseline
c. File System
d. Security
Feedback
Your answer is incorrect.
The correct answer is: Security baseline
Question 11
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a software service that manages the process of printing in the Windows
environment.
Select one:
a. Server service
b. Print Spooler service
c. Workstation service
d. Messenger service
Feedback
Your answer is incorrect.
The correct answer is: Print Spooler service
Question 12
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
File system that has a features like permissions, encryption, quotas, and
auditing services.
Answer:
Feedback
The correct answer is: NTFS
Question 13
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
A popular feature of Windows that allows you to harden multiple systems quickly.
Answer:
Feedback
The correct answer is: Security Templates
Question 14
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Is a service responsible for sending messages to other computers or users.
Select one:
a. Messenger service
b. Server service
c. Print Spooler service
d. Workstation service
Feedback
Your answer is incorrect.
The correct answer is: Messenger service
Question 15
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It ensure that the essential and vital services are only running on the system
Answer:
Feedback
The correct answer is: Services running
Midterm quiz 2
Question 1
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Large volume of data is also known as
Answer:
Feedback
The correct answer is: Big Data
Question 2
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a security concern because most scripting languages can make some
alteration to your system.
Select one:
a. Scripting
b. Cross-site scripting
c. Java
d. Cookies
Feedback
Your answer is incorrect.
The correct answer is: Scripting
Question 3
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is the idea of developing a database system to store and retrieve large
volumes of data
Answer:
Feedback
The correct answer is: NoSQL databases
Question 4
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Developers should always implement validation at both the client and the server
to obtain high level of security.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 5
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
very single application must go through the options and check whether each
application is configured in the most secure state.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 6
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
To avoid and prevent this type of attack, users should always choose the
“Remember Me” option when logging in to any web site.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 7
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a special system used in industrial environments and settings to monitor
their operations
Select one:
a. Mainframe
b. SCADA
c. Embedded
d. Android
Feedback
Your answer is incorrect.
The correct answer is: SCADA
Question 8
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It can manipulate your system including the deletion of the important files on
your computer.
Answer:
Feedback
The correct answer is: ActiveX controls
Question 9
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
These are logon information from all the websites you visit and is stored in
memory on computer
Answer:
Feedback
The correct answer is: Cookies
Question 10
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a restricted area with a resource that these Java applications can access.
Select one:
a. Scripting
b. Sandbox
c. Java
d. ActiveX controls
Feedback
Your answer is incorrect.
The correct answer is: Sandbox
Question 11
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Always disable unnecessary features of the web server that are not going to be
used
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 12
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is another term for a runtime error
Answer:
Feedback
The correct answer is: Exception
Question 13
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
The following codes is an example of?
Try
MessageBox.Show(cdbl(txtTotalValue.text) + cdbl(txtTotalVAT.text))
Catch ex as InvalidCastException
Catch ex as Exception
End Try
Select one:
a. handling errors
b. try/catch block
c. Exception handling
d. block syntax
Feedback
Your answer is incorrect.
The correct answer is: try/catch block
Question 14
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is an advanced method of handling an error.
Answer:
Feedback
The correct answer is: Exception handling
Question 15
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
SMTP and FTP are used to transfer information over a computer network.
Select one:
True
False
Feedback
The correct answer is 'True'.