Information Security Quiz Solved CS205 Quiz 1 Solution for Help in Studies or Exams and Improve Knowledge or Learning
Skills. Also, Get PDF File Given Below.
CS205 QUIZ 1 SOLVED
1. Which of the following cis critical control is discussed in this module?
a) Secure configuration for network devices
b) Malware defense
c) Boundary defense
d) Data protection
2. Automated configuration monitoring tools should complaint with which protocol to streamline reporting?
a) Ffiec
b) Disa
c) Cis
d) Scap
3. How can authorized wireless access point connected to a wired network can be detected?
a) Through wireless instruction detection system
b) Through network-based intrusion detection system
c) Through file integrity monitoring solution
d) Through host-based data loss prevention (dlp)
4. In an enterprise which software’s should be allowed to install and execute?
a) Any freely available software
b) Only paid software
c) Software’s displayed on notice board
d) Software’s included in the whitelist
5. Why security engineering is placed at layer 3 of transformation model?
a) Consists of complicated security activities which take more time and effort
b) Because it’s a low hanging fruit
c) Requires very less and effort
d) Its not very beneficial to implement so kept at the later stage
6. The dedicated machine used by administrators for administrative task should have following features.
a) Have internet access
b) Email and browsing facility available
c) Isolated from the organization primary network
d) All routine operational functions can be performed it
7. As per cis framework what is the best practice to store logs generated from system?
a) Store logs on the same machine which generates
b) Store logs on a machine other than which generates
c) Store logs on different dispersed location
d) Aggregate logs to a central management system
Check Also:
All Midterm Past Papers by Moaaz Solved
Virtual university All Handouts
8. As per cis critical controls from how many minimum synchronized time resources all network devices and servers should retrieve time?
a) Three
b) One
c) Two
d) As many as possible
9. How can an authorized wireless access point connected to a wired network can be detected and alerts can be generated?
a) Through network vulnerability scanning tools
b) Through file integrity monitoring solution
c) Through host-based data loss prevention (dlp)
d) Through network-based intrusion detection system
10. Before deploying any new devices in a networked environment what should be done with passwords?
a) Remove the passwords
b) Keep the default passwords
c) Create very small passwords
d) Change the default passwords
0 Comments