Question 1 of 15 | 7.0 Points |
Which of the following is not a primary objective of information security? |
| A.Confidentiality | |
| B.Integrity | |
| C.Privacy | |
| D.Availability | |
Answer Key: C |
|
| Question 2 of 15 | 7.0 Points |
Which of the following has the ultimate and final responsibility for network security in an organization? |
| A.IT management | |
| B.Network administrator | |
| C.Senior management | |
| D.IT security staff | |
Answer Key: C |
|
| Question 3 of 15 | 7.0 Points |
Security ________ are goals an organization strives to achieve through its security efforts. |
| A.baselines | |
| B.guidelines | |
| C.objectives | |
| D.None of the above | |
Answer Key: C |
|
| Question 4 of 15 | 7.0 Points |
Which IT domain in a typical IT infrastructure typically includes routers, circuits, switches, firewalls, and equivalent gear at remote locations? |
| A.LAN Domain | |
| B.LAN-to-WAN Domain | |
| C.WAN Domain | |
| D.System/Application Domain | |
Answer Key: C |
|
| Question 5 of 15 | 7.0 Points |
The lack of ____________ is both a strength and weakness of workgroups. |
| A.user accounts | |
| B.peers | |
| C.shared resources | |
| D.central authority | |
Answer Key: D |
|
| Question 6 of 15 | 7.0 Points |
What does a client/server environment have that a peer-to-peer networking environment typically does not? |
| A.server | |
| B.workstations | |
| C.hubs or switches | |
| D.shared resources | |
Answer Key: A |
|
| Question 7 of 15 | 7.0 Points |
A _________ is a boundary network that hosts resource servers for the public Internet. |
| A.DMZ | |
| B.intranet | |
| C.WAN | |
| D.choke point | |
Answer Key: A |
|
| Question 8 of 15 | 7.0 Points |
Which of the following enables you to check