Incident Threats Week 2
.docx
keyboard_arrow_up
School
Grand Rapids Community College *
*We aren’t endorsed by this school
Course
CYBER SECU
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
4
Uploaded by ConstableWildcatMaster401
Congratulations! You passed!
Grade received 100%
Latest Submission Grade 100%
To pass 80% or higher
Go to next item
1.
Question 1
Which mobile operating system was originally based on the Linux kernel?
1 / 1 point
iOS
Android
Blackberry
Windows
Correct
Correct!
2.
Question 2
Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2)
1 / 1 point
Android
Correct
Partially correct!
Blackberry
Windows
iOS
Correct
Partially correct!
3.
Question 3
True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.
1 / 1 point
True
False
Correct
Correct!
4.
Question 4
What is one limitation to the operation of anti-virus software running on mobile devices?
1 / 1 point
Antivirus software is very effective on mobile devices because it can inspect the data that is associated with each app but only while the app is not running.
Antivirus software can "see" the apps that are running on a mobile device but cannot see the data that is associated with each app.
Antivirus software must be granted permission to inspect each app on a device.
Mobile devices provide native security that makes additional anti-virus software unnecessary.
Correct
Correct!
5.
Question 5
On a mobile device, which type of threat is a phishing scam?
1 / 1 point
App based
System based
Internal
External
Correct
Correct!
6.
Question 6
A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?
1 / 1 point
Availability
Integrity
Authorization
Confidentiality
Correct
Correct!
7.
Question 7
A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?
1 / 1 point
Confidentiality
Availability
Authorization
Integrity
Correct
Correct!
8.
Question 8
A student can see her grades via her school's Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?
1 / 1 point
Authorization
Integrity
Availability
Confidentiality
Correct
Correct!
9.
Question 9
True or False. An operator who corrupts data by mistake is considered an "inadvertent attack" that should be considered when developing data protection plans.
1 / 1 point
True
False
Correct
Correct!
10.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help