Amandeep Kaur Brar 2
.docx
keyboard_arrow_up
School
Stott's College *
*We aren’t endorsed by this school
Course
ACC104
Subject
Information Systems
Date
Apr 26, 2024
Type
docx
Pages
5
Uploaded by amarjeetkaur261
Knowledge Quiz 1
Unit and Assessment Details Assessment Title
Knowledge Quiz 1
Unit/Cluster Code
ICTNWK405
Unit/Cluster Title
Build a small wireless local area network
Course Code - Title
ICT50415 – Diploma in Information Technology Networking
Assessment Date/Due Date
27-July-2016, due 3-August-2016
Student ID
SI00952
Student Name
Amandeep Kaur
Assessment Instructions for Students
1.
This assessment has to be completed individually. 2.
Complete your details in the table above.
3.
Write your answers in the space provided.
4.
You must use your own words to formulate the answers.
5.
Provide references to any source materials you have used.
Required Resources and Tools for this assessment
Following resources and tools required to complete this assessment will be made available to you at
the time of assessment:
1.
Computer with access to LMS and Internet
Knowledge Quiz 1
Version: 1.0 – 22-April-2016 – Current
Page 1 of 5
Knowledge Quiz 1
Online quiz
Write your answers in the space provided.
Instructions for learners:
1.
Which of the following is not a security threat?
a.
Social Engineering
b.
Malware
c.
Ransomware
d.
Firmware
D
Correct
2.
Which two (2) of the following statements are not true?
a.
Intrusion detection systems can identify malicious traffic
b.
Intrusion detection can remove viruses and other malware
c.
Intrusion detection tends to have false positives
d.
Intrusion detection only works in networking environment
B, C
3.
Which of the following is an example of an IDS?
a.
Symantec antivirus
b.
SNORT
c.
SANS
d.
Firewall B.
Correct
4.
Which of the following does not involve in an IT audit?
a.
Evaluating the risk level of IT systems
b.
Checking the IT system against baselines
c.
Configuring Firewall to prevent unauthorized access
d.
Measuring the system against set standards C. 5.
Which of the following exploits human weaknesses and trick people to reveal confidential information?
a.
Physical security testing
b.
Web application security testing
c.
Social engineering
d.
Application security testing C
Knowledge Quiz 1
Version: 1.0 – 22-April-2016 – Current
Page 2 of 5
Knowledge Quiz 1
Correct
6.
Which of the following is a networking protocol?
a.
HTTP
b.
UDP
c.
SSL
d.
Web 2.0 B
Correct
7.
Which of the following is a security protocol?
a.
HTTP
b.
UDP
c.
SSL
d.
Web 2.0 C
Correct
8.
In less no more than 50 words, explain what single sign-on (SSO) systems are.
Single sign-on (SSO) is a session and user authentication service it give permission to client to use one set of login credentials.
http://searchsecurity.techtarget.com/definition/single-sign-on
9.
What is the goal of encryption?
a.
Ensuring availability of data
b.
Ensuring integrity of data
c.
Ensuring validity of data
d.
Ensuring confidentiality of data D. Correct
10.
What is the difference between bandwidth and quality of service? Bandwidth describes the maximum data transfer rate of a network or Internet connection and quality of service (QoS) prioritizes traffic by type so the really important stuff gets the bandwidth it needs to cross the network unimpeded by the unimportant stuff.
Correct
11.
Describe two factors that may affect signal quality in a wireless network.
1.
Physical objects: Trees, masonry, buildings, and other physical structures are some of the most common sources of interference.
2.
Environmental factors: Weather conditions can have a huge impact on wireless signal integrity. Lightning, rain, etc.
Knowledge Quiz 1
Version: 1.0 – 22-April-2016 – Current
Page 3 of 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help