Product Description
SEC 280 DeVry Week 5 Quiz Latest
SEC 280 DeVry Week 5 Quiz Latest
SEC280
SEC 280 DeVry Week 5 Quiz Latest
Question 1. Question : (TCO 6) In terms of physical security, _____ refers to protecting important assets by using several perimeters.
- layered access
- multifactor access control
- dual authentication
- an intrusion-detection system
Question 2. Question : (TCO 6) Which of these, according to this chapter, is not a step that can be taken to help mitigate physical security risk?
- All users need security training.
- Electronic physical security systems need to be protected from network-based attacks.
- Authentication systems should use multiple factors when feasible.
- Constantly monitor all employees via camera.
Question 3. Question : (TCO 6) The best fire extinguisher for petroleum products is a _____.
- Class A
- Class B
- Class C
- Class D
Question 4. Question : (TCO 6) _____ are computers in a network that host applications and data for everyone to share.
- Linux boxes
- Servers
- Firewalls
- Cryptographies
Question 5. Question : (TCO 6) A virtual private network (VPN) is a construct used to provide _____.
- users with an individual web space on the network
- an area of relaxation for employees
- a secure communication channel between users across public networks, such as the Internet
- a learning area for programming languages
Question 6. Question : (TCO 6) Media can be divided into three categories: _____.
- paper, plastic, and cloth
- magnetic, optical, and electronic
- confidential, integrity, and authority
- red, yellow, and blue
Question 7. Question : (TCO 6) _____ are types of magnetic media.
- CDR, CDRW, and DVD
- Linux, Windows, and Oracle
- Hard drives, diskettes, and tapes
- Keyboards, mice, and monitors
Question 8. Question : (TCO 6) Which of the following is not a component of an IDS?
- Traffic collector
- Signature database
- Expert-knowledge database
- User interface and reporting
Question 9. Question : (TCO 6) A new breed of IDS that is designed to identify and to prevent malicious activity from harming a system is called _____.
- preemptive IDS
- preventive IDS
- active IDS
- dynamic IDSA
Question 10. Question : (TCO 6) Egress filtering _____.
- scans incoming mail to catch SPAM
- scans outgoing mail to catch SPAM
- scans messages for specific words or phrases
- filters out POP traffic

SEC 280 DeVry Week 5 Quiz Latest
ABS,AC,ACC,ACCT,ACT,ADJ,AH,AJS,AMP,ANT,ART,BA,BAM,BBA,BCOM,BIO,BIOS,BIS,BMGT,BPA,BSA,BSE,BSHS,BSOP,BUS,BUSN,CARD,CEIS,CHEM,CIS,CIT,CJA,CJS,CMC,CMGT,COLL,COM,COMM,COMP,CPN1,CRJ,CRMJ,CRT,CS,CWV,DBM,EBUS,ECE,ECET,ECN,ECO,
ECOM,ECON,ECT,EDU,EED,EMM,ENG,ENGL,ENT,ENTR,ESE,ETH,ETHC,FIN,FIS,FP,GB,GBM,GED,GEN,GENERAL QUESTIONS,GLG,GM,GSCM,HCA,HCS,HHS,HIS,HIST,HLT,HOSP,HPE,HRM,HSA,HSM,HTM,HTT,HUM,HUMN,IFSM,INFT,INT,IS,ISCOM,IT,ITB,JADM,JUS,JWI,
LAS,LAW,LAWS,LDR,LEG,LIT,LTC,MA,MAT,MATH,MGMT,MGT,MIS,MKT,MKTG,MTH,NETW,NR,NRS,NSCI,NTC,NUR,NURS,OI,OMM,OPS,ORG,PA,PAD,PCN,PHI,PHL,PHYS,PM,POL,POLI,POS,PPA,PRG,PROJ,PSC,PSY,PSYC,PSYCH,QNT,QRB,RDG,REL,RELI,RES,SBE,SCI,SEC,SOC,SOCS,SPE,SRM,STAT,STR,SYM,TCH,UNV,WEB,XACC,XBIS,XCOM,XECO,XMGT
There are no reviews yet.