Federal Government and security industry create an inventory of known software vulnerabilities known as __________ A) Common Vulnerabilities and Exposure B) Vulnerabilities Database C) Inventory of most know issues. 27 Vulnerability is the ______________________ in the information system that gives an opportunity to compromise the asset. A) Backend database weakness B) Weakness C) Software bug D) Hardware Vulnerability E) None 28 The vulnerability of an asset creates _________________. a) Software bug b) Hardware vulnerability c) Threats d) All 29 The Role of Information Security is to minimize the impact of ______________________ a) Hackers attack b) restriction to the system C) unavailability d) Threats e) None f) All 30 A software vulnerability is the error in : A) Specification B) Development C) Configuration D) All E)None
26 |
Federal Government and security industry create an inventory of known software vulnerabilities known as __________
A) Common Vulnerabilities and Exposure B) Vulnerabilities |
|
27 |
Vulnerability is the ______________________ in the A) Backend database weakness B) Weakness C) Software bug D) Hardware Vulnerability E) None |
|
28 |
The vulnerability of an asset creates _________________. a) Software bug b) Hardware vulnerability c) Threats d) All |
|
29 |
The Role of a) Hackers attack b) restriction to the system C) unavailability d) Threats e) None f) All
|
|
30 |
A software vulnerability is the error in : A) Specification B) Development C) Configuration D) All E)None
|
|
31 |
____________ is ensuring users can access objects and data they are allowed to see.
A) Authentication B) Authorization C) Encryption D) None
|
|
32 |
Most common vulnerability in any system or application/software is :
a) SQL Injection b) Cross-Site Scripting c) Unencrypted data d) Missing Authorization e) All |
|
33 |
Most common threats to any system is: a) Viruses/Worms B) Phishing C) DOS D) Malware E) All |
|
34 |
Any retired/decommissioned hardware/server _________________________. A) Need to be Auctioned D) Sale to employee C) Give it to charity D) Need to be disconnected from internet and shutdown E)None
|
|
35 |
Self-Signed Certificate is utilized for:
A) A) Commerical Use B) Only in Educational Institute C) Lab testing D) None
|
|
36 |
Information Security ___________________ are the safeguard to minimize the impact of information security threats. A) Authentication B) Controls C) SSL Certificates D) Firewalls
|
|
37 |
On May 5th 2000 many receives a virus name _______________________________ A) Stuxnet B) James Bond Love You C) ILOVEYOU
|
|
38 |
NVD stands for: A) National Vulnerability Database B) Native Virus Data Center C) National Virus Database |
|
39 |
Which one is Internet facing Server: A) Database Server B) Application Server C) Web Server |
|
40 |
Web Server define as: a) A server which stores sensitive data b) Computer that deliver (serves up) Web pages C) a server which is not connected to Internet (to secure data). |
|
41 |
General Assets are assets that are found in most organization like: a) Online Learning System B)Email system C) Cafeteria System D) All
|
|
42 |
Idiosyncratic Assets are unique/distinct to any organization like: A) Payroll data B) Banner/Online Learning System C) Student transcripts D) All |
|
43 |
Please circle correct Assets Types: A) Information Assets B) Personal Assets C) Hardware Assets D) Gold & Stock Assets E) All |
|
44 |
In any system there are three important components for their infrastructure just like for Student Information System(SIS)
a) Web, Application and Printer Server b) Application Server, Printer Server and Database Server C) Web, Application and Database Server D) All
|
|
45 |
________________ is a form of Encryption where keys come in pairs.
A) Public Key B) Asymmetric Encryption C) Symmetric encryption
|
|
46 |
Virtualization refers to the creation of a virtual resource such as a server, desktop, A) Different types of Hardware and Software B) To run multiple operating systems on a single piece of hardware C) To run multiple operating systems on a multiple pieces of hardware
|
|
47 |
Email System crashed due to Old Server with two internal drives, what system you will recommend?
A) Repair old system and restart again (save money) B) Maintain email services locally C ) Replace entire email system with SaaS email solution. D) Replace with Google Apps or Outlook for Education.
|
|
48 |
Authentication process is: A) Accepting the user’s credentials and allowing them to log on. B) Accepting the user’s credentials and allowing them to log on and review and see necessary pages. C) Ensuring users can access objects and data they are allowed to see. D) All
|
|
49 |
The process of converting information or data into a code, especially to prevent unauthorized access known as: A) Coding B) Coding via SSL certificate C) Encryption D) De-encryption |
|
50 |
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of:
A) HTPPS B) HTTP C) SSL(Secure Socket Layer) D) None |
|
Step by step
Solved in 2 steps