These
are the automatically computed results of your exam. Grades for essay
questions, and comments from your instructor, are in the
"Details" section below.
Date
Taken:
6/13/2015
Time
Spent:
58 min , 01 secs
Points
Received:
36 / 40 (90%)
Question
Type:
# Of
Questions:
#
Correct:
Multiple
Choice
10
9
Grade Details - All Questions
Question 1.
Question
:
(TCO
8) What two things are needed in order to configure a computer for a
proxy server?
Student
Answer:
Administrator
passwords on both the local computer and proxy server
IP
address of the local computer and administrator name on the proxy server
IP
address and MAC address of the proxy server
IP
address and port number of the proxy server
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 2.
Question
:
(TCO
9) What technology is used to add hardware to protect laptops?
Student
Answer:
Key
card
RFID
Hardware
token
USS
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 3.
Question
:
(TCO
8) Which Windows tool do you use to view a recorded log of network
activity?
Student
Answer:
regedit
dos
command, logs
record
Event
Viewer
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 4.
Question
:
(TCO
8) _____ prove(s) that individuals are who they say they are.
Student
Answer:
Authentication
Authorization
A
background process
BIOS
settings
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 5.
Question
:
(TCO
8) The largest security risk for stealing confidential data comes from
____.
Student
Answer:
Russian
or Chinese hackers
college
students studying hacking
employees
leaving passwords in full view
disgruntled
employees
Instructor
Explanation:
Week
6 Online Lecture
Points
Received:
0 of 4
Comments:
Question 6.
Question
:
(TCO
8) Technology that enables you to create a tunnel from one network device
to another over the Internet is _____.
Student
Answer:
VPN
phishing
encryption
WEP
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 7.
Question
:
(TCO
8) What security term describes a program written to collect information
and store it on the hard drive?
Student
Answer:
Virus
Intrusion
detection and alerts
Cookie
Authentication
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 8.
Question
:
(TCO
4) Which of the following Linux commands will change the
/home/henry/smile file’s modification and last accessed times to the
current time?
Student
Answer:
ls
/home/henry/smile
rm
/home/henry/smile
touch
/home/henry/smile
cat
/home/henry/smile
Instructor
Explanation:
TestOut
Linux+, Section 1.8
Points
Received:
4 of 4
Comments:
Question 9.
Question
:
(TCO
9) Which technique provides the most security for the clients on a
wireless network?
Student
Answer:
Disable
SSID broadcasting
Enable
WEP
Enable
WPA
Enable
WPA2
Instructor
Explanation:
Schmidt,
Chapter 15
Points
Received:
4 of 4
Comments:
Question 10.
Question
:
(TCO
11) Trust between you and your customer begins with _____.
No comments:
Post a Comment