100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEIS299 Week 8 Quiz $30.49   Add to cart

Exam (elaborations)

CEIS299 Week 8 Quiz

 0 view  0 purchase
  • Course
  • Institution

Exam of 27 pages for the course nursing course at nursing course (CEIS299 Week 8 Quiz)

Preview 3 out of 27  pages

  • January 16, 2024
  • 27
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Question 1

Which authentication factor can use an authentication method based on information extracted from a
packet header?

Something you have

Something you are

Something you know

Somewhere you are



Question 2

Data destruction can be accomplished with all the following EXCEPT:

Pulping

Burying

Burning

Shredding



Question 3

As a part of data center planning you have leased rack space in offsite datacenters: one in the US, as the
site used for offsite backups and recovery, and the other in Mexico, as the failover and alternative
processing site. You will maintain the datacenter at HO in US. All sites are at a distance of 1,500 miles
from each other. You receive notice from legal that due to the recent award of a DOD contract, no
technical specifications, nor the required encryption technology can leave the country. Which geographic
consideration is properly planned for in this situation?

Location selection

Distance

Legal implications

offsite backups



Question 4

A user reports that they have received an e-mail from their credit card. The e-mail states there is a
problem with their account. The e-mail provides a link to follow to correct the issue; however, upon
further inspection, the user notices the URL looks suspicious. Of which of the following is this MOST
likely an example?

, Adware

Pharming attack

Phishing attack

ARP Poisoning attack



Question 5

You need to implement biometric access controls to a high security location in your office. Which
biometric factor would be considered the least accurate?

Voice recognition

Facial recognition

Fingerprints

Iris pattern



Question 6

You are the Network professional for a small boutique hedge fund in lower Manhattan. You depend on
your servers to manage transactions at the average rate of $7,000,000 daily. Your industry is being
targeted by Ransomware, which has increased the likelihood of an incident occurring over the course of
a year to 40%. A successful attack will keep your servers offline for two hours. Assuming a seven-hour
workday what is the ALE?

$80,000

$500,000

$50,000

$800,000



Question 7

Various systems in your network environment use consistent settings. You want to be able to check the
settings are accurate. What should you do?

Have automated configuration validation

Apply master images to the various systems

Provide continuous monitoring through automation

Use a template with the configuration settings

, Question 8

The system administrator at a small corporation is in the process of upgrading the network intrusion
detection system but doesn't have time to build an extensive threat database or establish a threat
threshold from scratch. Rather, the administrator chooses to rely on the cumulative data compiled by
various trusted security vendors regarding known network security threats to guard against. Which
monitoring methodology would be most likely to report false negatives under these circumstances?

Heuristic monitoring

Signature-based monitoring

Behavior or anomaly-based monitoring

Rule-based monitoring



Question 9

You have implemented the use of request verification tokens associated with user sessions for a web
server. Which type of attack will this help prevent?

IP spoofing

XSRF

Privilege escalation

Zero-day



Question 10

A user is preforming a search using a popular search engine. They come across a website where they can
win a sum of money by clicking on a link. When the user clicks on the link they are taken to a blank
page. Later they notice that several posts have been made to their social media site containing adds.
Which of the follow attacks being described?

URL hijacking

Typo squatting

Session hijacking

Clickjacking



Question 11

Which of the following is a definition of “Circuit-level proxy”?

Enables one proxy per service

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller LEARNEXAMS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $30.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$30.49
  • (0)
  Add to cart