Wednesday 15 July 2015

DeVry Comp 129 Week 6 Quiz - Latest
 IF You Want To Purchase A+ Work Then Click The Link Below  , Instant Download

If You Face Any Problem E- Mail Us At  JOHNMATE1122@Gmail.Com


Week 6(Quiz)

Grading Summary
These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below.
Date Taken:
6/13/2015
Time Spent:
58 min , 01 secs
Points Received:
36 / 40  (90%)
Question Type:
# Of Questions:
# Correct:
Multiple Choice
10
9

Grade Details - All Questions

Question 1.
Question :
(TCO 8) What two things are needed in order to configure a computer for a proxy server?

Student Answer:

 Administrator passwords on both the local computer and proxy server



 IP address of the local computer and administrator name on the proxy server



 IP address and MAC address of the proxy server



 IP address and port number of the proxy server

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 2.
Question :
(TCO 9) What technology is used to add hardware to protect laptops?

Student Answer:

 Key card



 RFID



 Hardware token



 USS

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 3.
Question :
(TCO 8) Which Windows tool do you use to view a recorded log of network activity?

Student Answer:

 regedit



 dos command, logs



 record



 Event Viewer

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 4.
Question :
(TCO 8) _____ prove(s) that individuals are who they say they are.

Student Answer:

 Authentication



 Authorization



 A background process



 BIOS settings

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 5.
Question :
(TCO 8) The largest security risk for stealing confidential data comes from ____.

Student Answer:

 Russian or Chinese hackers



 college students studying hacking



 employees leaving passwords in full view



 disgruntled employees

Instructor Explanation:
Week 6 Online Lecture


Points Received:
0 of 4

Comments:


Question 6.
Question :
(TCO 8) Technology that enables you to create a tunnel from one network device to another over the Internet is _____.

Student Answer:

 VPN



 phishing



 encryption



 WEP

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 7.
Question :
(TCO 8) What security term describes a program written to collect information and store it on the hard drive?

Student Answer:

 Virus



 Intrusion detection and alerts



 Cookie



 Authentication

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 8.
Question :
(TCO 4) Which of the following Linux commands will change the /home/henry/smile file’s modification and last accessed times to the current time?

Student Answer:

 ls  /home/henry/smile



 rm  /home/henry/smile



 touch  /home/henry/smile



 cat  /home/henry/smile

Instructor Explanation:
TestOut Linux+, Section 1.8


Points Received:
4 of 4

Comments:


Question 9.
Question :
(TCO 9) Which technique provides the most security for the clients on a wireless network?

Student Answer:

 Disable SSID broadcasting



 Enable WEP



 Enable  WPA



 Enable WPA2

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:


Question 10.
Question :
(TCO 11) Trust between you and your customer begins with _____.

Student Answer:

 never lying.



 good communications skills



 a new customer discount



 professionalism.

Instructor Explanation:
Schmidt, Chapter 15


Points Received:
4 of 4

Comments:




No comments:

Post a Comment