10.7.4 Section Quiz
pdf
keyboard_arrow_up
School
University of Nevada, Las Vegas *
*We aren’t endorsed by this school
Course
621
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
5
Uploaded by JusticePencil12893
11/14/23, 2:11 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_575/exam-engine.html/c855ba0d-1736-4d81-8845-09bc196bff91/exam-session/31294808/e4980358-d3c5-4f2d-b…
1/5
10.7.4 Section Quiz
Candidate:
Devon Cashmon (devon.cashmon)
Date:
11/14/2023 2:11:00 pm •
Time Spent:
02:51
Score: 100%
Passing Score: 80%
Question 1:
Correct
Which of the following BEST describes a system administrator?
He or she works closely with law enforcement
officials to investigate security breaches and
other crimes.
He or she is typically responsible for securing
networks and responding to intrusions in
smaller organizations.
He or she understands and uses ethical
hacking techniques such as penetration
testing and vulnerability assessment.
He or she is in charge of designing and
implementing security methods to protect an
organization's computer systems.
Explanation
In smaller organizations, a system administrator is typically responsible for securing networks and
responding to intrusions.
A computer forensics expert works closely with law enforcement officials to investigate security
breaches and other crimes.
Information security analysts or engineers are in charge of designing and implementing security
methods to protect an organization's computer systems. They must understand how to use ethical
hacking techniques such as penetration testing and vulnerability assessment.
References
10.7.2 Security Career Facts
q_itf_securitycareers_01.question.fex
11/14/23, 2:11 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_575/exam-engine.html/c855ba0d-1736-4d81-8845-09bc196bff91/exam-session/31294808/e4980358-d3c5-4f2d-b…
2/5
Question 2:
Correct
A security analyst does which of the following?
Installs and configures access controls,
monitors network performance, and detects
unauthorized access.
Is typically responsible for securing networks
and responding to intrusions in smaller
organizations.
Works closely with law enforcement officials
to investigate security breaches, cyberattacks,
and other crimes.
Inspects the company's network for security
breaches and recommends measures to
prevent future attacks.
Explanation
A security analyst inspects the company's network for security breaches and recommends measures to
prevent future attacks.
A computer forensics expert works closely with law enforcement officials to investigate security
breaches, cyberattacks, and other crimes.
In smaller organizations, a system administrator is typically responsible for securing networks and
responding to intrusions. He or she installs and configures access controls, monitors network
performance, and detects unauthorized access.
References
10.7.2 Security Career Facts
q_itf_securitycareers_02.question.fex
11/14/23, 2:11 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_575/exam-engine.html/c855ba0d-1736-4d81-8845-09bc196bff91/exam-session/31294808/e4980358-d3c5-4f2d-b…
3/5
Question 3:
Correct
Which of the following is the system administrator's MOST important task?
Monitoring and maintaining system security
Installing firewalls and anti-malware
protection
Investigating cyberattacks
Designing and implementing security
methods
Explanation
A system administrator's most important tasks is to monitor and maintain system security.
A computer forensics expert investigates security breaches and cyberattacks.
Information security analysts or engineers are in charge of designing and implementing security
methods and installing firewalls and anti-malware protection.
References
10.7.2 Security Career Facts
q_itf_securitycareers_03.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11/14/23, 2:11 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_575/exam-engine.html/c855ba0d-1736-4d81-8845-09bc196bff91/exam-session/31294808/e4980358-d3c5-4f2d-b…
4/5
Question 4:
Correct
Which of the following would you do as a computer forensics expert?
Research new threats and vulnerabilities and
recommend measures to prevent future
attacks.
Understand and use ethical hacking
techniques such as penetration testing and
vulnerability assessment.
Install and configure access controls, backups,
and firewalls as well as monitor network
performance.
Recover digital evidence, some of which may
have been damaged or deleted from storage
devices.
Explanation
A computer forensics expert recovers digital evidence such as emails and file metadata, some of which
may have been damaged or deleted from storage devices.
Security analysts research new threats and vulnerabilities. They inspect the company's network for
security breaches and recommend measures to prevent future attacks. They understand how to use
ethical hacking techniques such as penetration testing and vulnerability assessment.
A system administrator installs and configures access controls, backups, and firewalls. They also monitor
network performance and detect unauthorized access.
References
10.7.2 Security Career Facts
q_itf_securitycareers_04.question.fex
11/14/23, 2:11 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_575/exam-engine.html/c855ba0d-1736-4d81-8845-09bc196bff91/exam-session/31294808/e4980358-d3c5-4f2d-b…
5/5
Question 5:
Correct
Forensics experts need to be thoroughly familiar with which of the following?
Ethical hacking techniques such as
penetration testing and vulnerability
assessment
Access control, backups, firewalls, network
performance, and unauthorized access
Data encryption methods, operating systems,
and programming languages
Firewalls, anti-malware, threats,
vulnerabilities, security breaches, and attacks
Explanation
Forensics experts need to be thoroughly familiar with data encryption methods, operating systems,
programming languages, and forensic software applications.
In addition to installing firewalls and anti-malware protection, they research new threats and
vulnerabilities, inspect the company's network for security breaches, and recommend measures to
prevent future attacks. A security analyst must understand how to use ethical hacking techniques such
as penetration testing and vulnerability assessment.
A system administrator installs and configures access controls, backups, and firewalls. They also monitor
network performance and detect unauthorized access.
References
10.7.2 Security Career Facts
q_itf_securitycareers_05.question.fex
Copyright © 2023 TestOut Corporation All rights reserved.