للطلاب الذي طلبوا مقرر الدكتور ناجي ☝️☝️☝️
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
Grade 2.pdf
درجات مادة ادارة مشاريع
You are trying to explain security to a nontechnical manager. She has taken a rather extreme
view of computer security. Which of the following is one of the extreme viewpoints about
computer security discussed in this chapter?
view of computer security. Which of the following is one of the extreme viewpoints about
computer security discussed in this chapter?
Anonymous Quiz
70%
There are no imminent dangers to your system.
12%
The federal government will handle security.
9%
. Microsoft will handle security.
9%
There is no danger if you use Linux.
You have just taken over as network security administrator for a small community college. You
want to take steps to secure your network. Before you can formulate a defense for a network,
what do you need?
want to take steps to secure your network. Before you can formulate a defense for a network,
what do you need?
Anonymous Quiz
22%
Appropriate security certifications
75%
A clear picture of the dangers to be defended against
1%
To finish this textbook
3%
The help of an outside consultant
Mary is teaching an introductory cybersecurity course to freshmen. She is explaining to them
the major threats. Which of the following is not one of the three major classes of threats?
the major threats. Which of the following is not one of the three major classes of threats?
Anonymous Quiz
16%
Attempts to intrude on the system
15%
Denial of service attacks
14%
A computer virus
54%
Online auction fraud
Being able to define attack terms is an important skill for a cybersecurity professional. What is
a computer virus?
a computer virus?
Anonymous Quiz
13%
Any program that is downloaded to your system without your permission
63%
Any program that self-replicates
23%
. Any program that causes harm to your system
1%
Any program that can change your Windows Registry
Being able to define attack terms is an important skill for a cybersecurity professional. What is
spyware?
spyware?
Anonymous Quiz
65%
Any software that monitors your system
11%
Only software that logs keystrokes
15%
Any software used to gather intelligence
8%
. Only software that monitors what websites you visit
Elizabeth is explaining various hacking terms to a class. She is in the process of discussing
the history of phone system hacking. What is the term for hacking a phone system?
the history of phone system hacking. What is the term for hacking a phone system?
Anonymous Quiz
8%
Telco-hacking
10%
Hacking
12%
Cracking
70%
Phreaking
What is the name for the hacking technique that involves using persuasion and deception to
get a person to provide information to help compromise security?
get a person to provide information to help compromise security?
Anonymous Quiz
83%
A. Social engineering
0%
B. Conning
6%
C. Human intel
11%
D. Soft hacking
There are many threats on the Internet. Which one is currently the most common may
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
change over time, but certain threats have always been more common than others. Which of
the following is the most common threat on the Internet?
Anonymous Quiz
13%
A. Auction fraud
11%
B. Phreaking
69%
C. Computer viruses
7%
D. Illegal software
What are the three approaches to security?
Anonymous Quiz
61%
A. Perimeter, layered, hybrid
19%
B. High security, medium security, low security
13%
C. Internal, external, and hybrid
7%
D. Perimeter, complete, none
👍1
Defining your security strategy is an important step in securing a network. You are trying to
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
classify devices based on the approach they take to security. An intrusion detection system is
an example of which of the following?
Anonymous Quiz
55%
A. Proactive security
22%
B. Perimeter security
14%
C. Hybrid security
9%
D. Good security practices
Which of the following is the most basic security activity?
Anonymous Quiz
62%
A. Authentication
25%
B. Firewalls
8%
C. Password protection
4%
D. Auditing