Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Test Yourself
Here is a course review in the form of self-test questions, covering
questions that are related to modules after the midterm.
Sample Final Exam Questions
Please select the correct option and then click the "Check Your
Answer" button.
a. security testing
b. installing patches
c. planning
d. secure critical content
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. Virtualizing
b. White listing
c. Logging
d. Patching
e. Firewalling
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. SaaS
b. MaaS
c. PaaS
d. IaaS
e. SecaaS
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. community cloud
b. private cloud
c. hybrid cloud
d. public cloud
e. None of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. hybrid cloud
b. public cloud
c. private cloud
d. community cloud
e. All of the above
That's correct.
a. cloud auditor
b. cloud service consumer
c. cloud broker
d. cloud carrier
e. cloud provider
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. Web security
b. Security assessments
c. Intrusion management
d. Data loss prevention
e. Intrusion prevention
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. Intrusion management
b. SIEM
c. security assessments
d. web security
e. risk analysis
That's correct.
12. __________ comprise measures and mechanisms to
ensure operational resiliency in the event of any service
interruptions.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. microcontroller
b. gateway
c. carrier
d. sensor
e. Actuator
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. RFID
b. fog/edge network
c. core network
d. smart objects/embedded systems
e. data center/cloud
That's correct.
15. __________ has two operating modes, one tailored for
single-source communication, and another tailored for multi-
source broadcast communication.
Please select the correct option and then click the "Check Your
Answer" button.
a. Edge
b. Keystone
c. OpenSource
d. MiniSec
e. All of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. IT control
b. IT security management
c. IT discipline
d. IT risk implementations
e. Both A & B
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. asset management
b. business continuity management
c. information security incident management
d. physical and environmental security
e. Risk assessment
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. technical
b. operational
c. management
d. all of the above
e. None of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. technical
b. security awareness and training
c. maintenance
d. operational
e. management
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. security compliance
b. maintenance
c. incident handling
d. program management
e. risk analysis
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. ECB
b. OFB
c. CFB
d. ECC
e. CTR
That's correct.
a. Session key
b. Subkey
c. Key distribution technique
d. Ciphertext key
e. all of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. identity theft
b. ad hoc network
c. network injection
d. man-in-the-middle
e. IP spoofing
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. ESS
b. access point
c. distribution system
d. MPDU
e. Antenna
That's correct
26. The unit of data exchanged between two peer MAC
entities using the services of the physical layer is a(n)
____________.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. distribution system
b. coordination function
c. MAC data unit
d. wireless access system
e. dispatch function
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. 11 Mbps
b. 54 Mbps
c. 600 Mpbs
d. 1.3 Gbps
e. 3.5 Gbps
That's correct.
29. What is the IEEE standard for Bluetooth?
Please select the correct option and then click the "Check Your
Answer" button.
a. 802.15
b. 802.16
c. 802.11i
d. 802.15.4
e. 802.15.1
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. RTS/CTS
b. 3-way handshaking
c. 4-way handshaking
d. DORA
e. CSU/DSU
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. 802.11a
b. 802.11i
c. 802.11g
d. 802.11ac
e. 802.11n
That's correct.
32. The Canadian PIPEDA privacy protection law consists of
how many guiding principles?
Please select the correct option and then click the "Check Your
Answer" button.
a. 5
b. 6
c. 7
d. 10
e. 12
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. WEP
b. RSN
c. Wi-Fi
d. WPA
e. WPA2
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. plan
b. check
c. act
d. analyze
e. none of the above
That's correct.
35. The intent of the ________ is to provide a clear overview
of how an organization’s IT infrastructure supports its overall
business objectives.
Please select the correct option and then click the "Check Your
Answer" button.
a. risk register
b. corporate security policy
c. vulnerability source
d. threat assessment
e. security analysis
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. combined
b. informal
c. baseline
d. detailed
e. formal
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. baseline
b. combined
c. detailed
d. informal
e. formal
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. permanent key
b. session key
c. distribution key
d. all of the above
e. none of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. access
b. asset management
c. compliance
d. business continuity management
e. All of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. alert
b. emerge
c. crit
d. warning
e. risk
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. PKM
b. RCM
c. SSM
d. CCM
e. ECC
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
a. the type of operations used for transforming plaintext to
ciphertext
b. the number of keys used
c. the way in which the plaintext is processed
d. all of the above
e. none of the above
That's correct.
Please select the correct option and then click the "Check Your
Answer" button.
Please select the correct option and then click the "Check Your
Answer" button.
a. signature
b. message header
c. payload
d. Heartbeat
e. handshake protocol
That's correct.
PREVIOUS
Topics