jueves, 9 de junio de 2016

Cybersecurity v1.1 Module 2 Quiz



Cybersecurity v1.1 Module 2 Quiz


This quiz covers the content of the videos presented in Cybersecurity Module 2. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.




Pregunta 1  
What is an example of a modern malware defense mechanism?
intelligence-led threat defense
automatic antivirus updates

firewalls that are based on packet filtering
passwords that are encrypted with a 32 bit key

Pregunta 2   
What is one factor to be considered when designing a threat detection system that looks for abnormalities?
keeping computer operating systems updated with the latest patches
developing an effective network baseline for comparison

provisioning servers with enough CPU and memory to avoid DoS attacks
training employees to detect spam and adware


Pregunta 3  
What is a concern about user behavior when a retail company is developing an online feedback system?
anonymity on the Internet
type of web server to be deployed

enforcement of strong password policy
bandwidth of the Internet connection to the server


Pregunta 4  


Modern malware has the ability to change itself, such as modifying its encryption.
What term best describes this self-changing characteristic?
targeted
polymorphic

persistent
remotely controlled


Pregunta 5   
An online retailer is developing a system to deal with questions and complaints mentioned in customer feedback. What factor requires customer complaints to be dealt with as quickly as possible?
herd mentality
product shelf life

shipping cost for delivering orders
loss of products during return process


Pregunta 6   
What is the purpose of a rootkit?
to masquerade as a legitimate program
to deliver advertisements without user consent

to replicate itself independently of any other programs
to gain privileged access to a device while concealing itself

No hay comentarios:

Publicar un comentario