The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 56 Weeks Ago, 4 Days Ago |
| Questions Answered: | 7570 |
| Tutorials Posted: | 7352 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
CIS 349 Week 11 Final Exam
Question 1
Â
Â
_______________ are mechanisms that recognize when an undesired action has occurred, such as motion detectors or usage log analysis diagnostics.
Â
Question 2
Â
Â
Regarding user security clearances, in addition to possessing a clearance level that matches or exceeds the classification label of an object, a subject must have the ___________ for the object as well.
Â
Question 3
Â
Â
When researching a prospective employee, for which of the following must you seek prior permission from the subject?
Â
Question 4
Â
Â
I. List tasks along one axis and personnel or roles along the other axis.
II. Assign a level or responsibility for each role and task.
III. Assign each person or role a level of responsibility and accountability for each task.
The above three steps pertain to the creation of the ____________________
Â
Question 5
Â
Â
Of the following, what is the best method of maximizing integrity in the Workstation Domain?
Â
Question 6
Â
Â
There are two main approaches for authorizing users to access objects. One method uses _____________, which are lists of access permissions that define what each user or security group can do to each object.
Â
Question 7
Â
Â
Of the following, what is the best method of reducing the success of fingerprinting attacks on computers?
Â
Question 8
Â
Â
Of the following, what is the best method of maximizing confidentiality in the Workstation Domain?
Â
Question 9
Â
Â
The hardware devices that connect other devices and computers using connection media are known as:
Â
Question 10
Â
Â
Of the following controls, which is the best choice for protecting the confidentiality of data in the LAN Domain?
Â
Question 11
Â
Â
Which of the following best describes Media Access Control (MAC)?
Â
Question 12
Â
Â
Which of the following is NOT typically a LAN Domain component?
Â
Question 13
Â
Â
Which of the following is NOT a common method of maximizing C-I-A in the LAN-to-WAN Domain?
Â
Question 14
Â
Â
Which of the following is the definition of demilitarized zone (DMZ)?
Â
Question 15
Â
Â
What is an intrusion detection system (IDS)?
Â
Question 16
Â
Â
What is the primary type of control used to protect data in the WAN Domain?
Â
Question 17
Â
Â
As a policy, consider all ____________ to be hostile and insecure.
Â
Question 18
Â
Â
Which of the following WAN-related items is NOT under the control of a typical WAN customer?
Â
Question 19
Â
Â
There are three main areas of concern in the Remote Access Domain: client-side configuration, server-side configuration, and _________________ verification.
Â
Question 20
Â
Â
You want to configure devices to send an alert to the network manager when remote users connect to your network. Which protocol is the best choice for monitoring network devices?
Â
Question 21
Â
Â
Which of the following is primarily a detective control in the Remote Access Domain?
Â
Question 22
Â
Â
In the System/Application Domain, data must be available to authorized users on demand. What can aid in this requirement?
Â
Question 23
Â
Â
What name is given to a collection of storage devices that is attached to a network in such a way that the devices appear to be local storage devices?
Â
Question 24
Â
Â
What is meant by virtual machine?
Â
Question 25
Â
Â
Which of the following best describes Common Body of Knowledge (CBK)?
Â
CIS----------- 34-----------9 W-----------eek----------- 11----------- Fi-----------nal-----------Â -----------Exa-----------m-----------