Module 4 midterm exam
Question 1 (1 point) Question 1 Unsaved
Which of the following is NOT a mitigation best practice for
online
banking risks?
Question 1 options:
Site encryption
A shared computer
Authentication security
Virus scanning
Save
Question 2 (1 point) Question 2 Unsaved
Which of the following are two of the most common online
banking threats?
Question 2 options:
Spoofing and phishing
Spoofing and ransomware
Persuasion and shoulder surfing
Phishing and persuasion
Save
Question 3 (1 point) Question 3 Unsaved
Which of the following is a means of authentication?
Question 3 options:
Neither A nor B
Kerberos
Both A and B
Public key infrastructure (PKI)
Save
Question 4 (1 point) Question 4 Unsaved
In a path traversal attack, the attacker commonly uses
__________ to
navigate the directory tree to access files in other
directories.
Question 4 options:
booleanBoolean
characters
Windows Explorer
../
None of the above
Save
Question 5 (1 point) Question 5 Unsaved
Data processing converts __________.
Question 5 options:
conclusions into facts
facts into conclusions
information into data
data into information
Save
Question 6 (1 point) Question 6 Unsaved
___________ involves protecting sensitive data through
encryption.
Question 6 options:
Insecure cryptographic storage
Failure to restrict URL access
Broken authentication and session management
Insecure communications
Save
Question 7 (1 point) Question 7 Unsaved
Which of the following is NOT a form of social engineering?
Question 7 options:
Dumpster diving
Shoulder surfing
Phishing
Ransomware
Save
Question 8 (1 point) Question 8 Unsaved
Which of the following is a type of hacker?
Question 8 options:
Social engineer
CISSP
Trojan horse
Man-in-the-middle
Save
Question 9 (1 point) Question 9 Unsaved
Although manually operated, what was one of the first
complex data
processing devices?
Question 9 options:
The Analytical Engine
The punch card tabulating system
The Difference Engine
The abacus
Save
Question 10 (1 point) Question 10 Unsaved
What uses Authentication Header (AH) and Encapsulating
Security
Payload (ESP) to create secure data transmissions?
Question 10 options:
XSS
IPSec
DNS
SSL
Save
Question 11 (1 point) Question 11 Unsaved
Which of the following is not a common phase of customer
life cycle management?
Question 11 options:
Retention
Inception
Conversion
Acquisition
Save
Question 12 (1 point) Question 12 Unsaved
Your company has several small branch offices spread
throughout the
state. Which of the following is the best choice to help
branch office
personnel meet and work on projects without incurring the
cost of
traveling?
Question 12 options:
Social media
Audio conferencing
VoIP
Unified collaborative communications (UCC)
Save
Question 13 (1 point) Question 13 Unsaved
Which security tenet emphasizes the need for the information
to be
delivered unaltered to the recipient?
Question 13 options:
Integrity
Authorization
Confidentiality
Availability
Save
Question 14 (1 point) Question 14 Unsaved
Which of the following helps to ensure the confidentiality
and
integrity of data communications?
Question 14 options:
DNS
IPSec
TCP/IP
SNMP
Save
Question 15 (1 point) Question 15 Unsaved
Which of the following acts as an intermediary for requests
from
clients seeking resources from other servers?
Question 15 options:
Perimeter defense
Proxy server
DMZ
Firewall
Save
Question 16 (1 point) Question 16 Unsaved
Software that executes on two or more computers in a network
is a
___________ application.
Question 16 options:
Cclient/server
mMainframe
dDistributed
pPeer to peer
Save
Question 17 (1 point) Question 17 Unsaved
Which of the following best describes a cookie?
Question 17 options:
A small data file that a Web site may write to your hard
drive
A small software program that is stored on a piece of
hardware and may
be updated to add more functionality
A type of shopping cart
A type of short-range communication network
Save
Question 18 (1 point) Question 18 Unsaved
Which of the following is a physical or logical subnetwork
that hosts
an organizationâs external services to an outside network,
such as the
Internet?
Question 18 options:
Proxy server
Perimeter defense
DMZ
Firewall
Save
Question 19 (1 point) Question 19 Unsaved
Which of the following techniques would help a Web
application to
properly validate user input?
Question 19 options:
Using SSL for all user input
Whitelisting and accepting only known good characters
Blacklisting unknown IP addresses
Cleansing all data in the database
Save
Question 20 (1 point) Question 20 Unsaved
The buying and selling of goods and services over the
Internet is
commonly referred to as __________.
Question 20 options:
social purchasing
brick and mortar sales
network commerce
e-commerce
Our Service Charter
-
Excellent Quality / 100% Plagiarism-Free
We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers. -
Free Revisions
We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed. -
Confidentiality / 100% No Disclosure
We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service. -
Money Back Guarantee
If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit. -
24/7 Customer Support
We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.