Quiz 6 - Question 1 1 out of 1 points The acronym MPLS stands for which of the following Selected B. Answer: Multiple Protocol Label Switching Answers: A. Multiple Packet Label Switching B. Multiple Protocol Label Switching C. Multi-Point Link Switching D. None of the above Question 2 1 out of 1 points Which of the following is NOT a form of switching used in data communication networks? Selected C. Answer: Time Switching Answers: A. Circuit Switching B. Packet Switching C. Time Switching D. All of the above Question 3 1 out of 1 points Wired Ethernet uses the Media Access Layer to control how multiple PCs access the wired network. Selected Fals Answer: e Answers: True Fals e Question 4 1 out of 1 points The data link layer is divided into 2 parts. A logical link layer which is used by older Ethernet standards, and a media access layer which controls access on shared networks. Selected Tru Answer: e Answers: Tru e False Question 5 1 out of 1 points The protocol used by the Data Link Media Access Layer is CSMA/CD for wired Ethernet and CSMA/CA for wireless Ethernet. Selected Tru Answer: e Answers: Tru e False Question 6 1 out of 1 points Computer A sends a message to Computer B. The message travels through 3 switches of Computer A's network and 2 switches of Computer B's network before arriving at computer B. How many data links did the message travel? Selected B. Answer: 2 Answers: A. 1 B. 2 C. 3 D. 4 Question 7 0 out of 1 points Computer A sends a message to Computer B. The message travels through 3 switches of Computer A's network before arriving a Computer A's router. The latter forwards the packet to Computer B's router. the message in turn is forwarded across 2 switches before arriving at computer B. How many routes did the message travel? Selected C. Answer: 3 Answers: A. 1 B. 2 C. 3 D. 4 Question 8 3 out of 3 points Answer the following questions based on the diagram.The computer on Network1 is sending a web request to the web server on network 4. For all answers use numbers. How many physical links are there (use a number)? [a] How many data links are there (use a number)? [b] How many packets were sent (use a number)? [c] Specified Answer for: a 7 Specified Answer for: b 4 Specified Answer for: c 1 Correct Answers for: a Evaluation Method Correct Answer Exact Match 7 Correct Answers for: b Evaluation Method Correct Answer Exact Match 4 Correct Answers for: c Evaluation Method Correct Answer Exact Match 1 Quiz 7 - Question 1 6 out of 6 points Match the acronym in the left column with the description in the right column. Question Correct Match Selected Match IEEE b. b. 802.1x A security protocol to protect switched A security protocol to protect switched Ethernet data ports Ethernet data ports IEEE a. a. 802.11i A WLAN security specification A WLAN security specification IEEE c. c. 802.3 A wired Ethernet standard A wired Ethernet standard RSTP d. d. A special port protocol which allows A special port protocol which allows loops in switched Ethernet loops in switched Ethernet PoE e. e. An Ethernet network that sends An Ethernet network that sends electricity in the frame electricity in the frame Core f. f. Switch A switch that connects to other A switch that connects to other switches switches All Answer Choices a. A WLAN security specification b. A security protocol to protect switched Ethernet data ports c. A wired Ethernet standard d. A special port protocol which allows loops in switched Ethernet e. An Ethernet network that sends electricity in the frame f. A switch that connects to other switches Question 2 1 out of 1 points The current wireless standard is which of the following? Selected b. Answer: WPA2 Answers: a. WEP b. WPA2 c. WPA d. WiFi Alliance Question 3 1 out of 1 points The most popular local area network technology today is which of the following: Selected c. Answer: Ethernet Answers: a. Arc Net b. Earthnet c. Ethernet d. Metro Ethernet Question 4 0 out of 1 points Which of the following is not a type of switch? Selected b. Answer: Workgroup Answers: a. Access Point b. Workgroup c. Cut Through d. Store and Forward Question 5 0 out of 1 points The most common wireless error is which of the following? Selected a. Answer: EMI Answers: a. EMI b. Jitter c. CrossTalk d. None of the above Quiz – 8 Question 1 0 out of 1 points Which of the following is true about software vendors? Selected a. Answer: All software vendors use a develop process with secure built in Answers: a. All software vendors use a develop process with secure built in b. All software vendors release only secure software c. All software vendors are not liable for faulty software d. All software vendors prepare patches in a timely fashion Question 2 1 out of 1 points According to the OWASP, the number one attack for 2016 was which of the following? Selected b. Answer: Injection Answers: a. DoS b. Injection c. XSS d. Buffer Overflows Question 3 0 out of 1 points A "bug" discovered during the design phase of a project, will cost approximately which of the following to fix? Selected c. Answer: $5000 Answers: a. $1000 b. $3000 c. $5000 d. $15000 Question 4 1 out of 1 points An open source community dedicated to improving software security is OWASP? Selected Tru Answer: e Answers: Tru e False Question 5 1 out of 1 points All reported malware and vulnerabilities are given a standard name and hosted on which of the following web sites as a searchable database? Selected c. Answer: cve.mitre.org Answers: a. www.cert.org b. www.oswap.org c. cve.mitre.org d. www.ietf.org Question 6 1 out of 1 points A "bug" that has been discovered and made scriptable is called a(n) _____________ . Selected b. Answer: exploit Answers: a. design flaw b. exploit c. virus d. vulnerability Question 7 1 out of 1 points Gary McGraw, the CTO for Cigital, said which of the following "security is ___________ job"? Selected d. Answer: everybody's Answers: a. the developer's b. the manager's c. the user's d. everybody's Question 8 1 out of 1 points A "bug", which has been discovered, and someone writes an automated script to execute the bug is called a(n) ________? Selected d. Answer: exploit Answers: a. flaw b. virus c. vulnerability d. exploit Question 9 1 out of 1 points Why is it important for developers to receive security training? Selected d. Answer: All of the above Answers: a. So they know to use the testing tools to build secure software b. So they understand the best practices to build secure software c. So they understand how a hacker thinks and misuses software d. All of the above Question 10 1 out of 1 points What is the cost of software defects annually in the United States? Selected c. Answer: $60 billion Answers: a. $40 billion b. $50 billion c. $60 billion d. $70 billion Quiz 9 - Question 1 0 out of 1 points Which of the following is true about software vendors? Selected a. Answer: All software vendors use a develop process with secure built in Answers: a. All software vendors use a develop process with secure built in b. All software vendors release only secure software c. All software vendors are not liable for faulty software d. All software vendors prepare patches in a timely fashion Question 2 1 out of 1 points According to the OWASP, the number one attack for 2016 was which of the following? Selected b. Answer: Injection Answers: a. DoS b. Injection c. XSS d. Buffer Overflows Question 3 0 out of 1 points A "bug" discovered during the design phase of a project, will cost approximately which of the following to fix? Selected c. Answer: $5000 Answers: a. $1000 b. $3000 c. $5000 d. $15000 Question 4 1 out of 1 points An open source community dedicated to improving software security is OWASP? Selected Tru Answer: e Answers: Tru e False Question 5 1 out of 1 points All reported malware and vulnerabilities are given a standard name and hosted on which of the following web sites as a searchable database? Selected c. Answer: cve.mitre.org Answers: a. www.cert.org b. www.oswap.org c. cve.mitre.org d. www.ietf.org Question 6 1 out of 1 points A "bug" that has been discovered and made scriptable is called a(n) _____________ . Selected b. Answer: exploit Answers: a. design flaw b. exploit c. virus d. vulnerability Question 7 1 out of 1 points Gary McGraw, the CTO for Cigital, said which of the following "security is ___________ job"? Selected d. Answer: everybody's Answers: a. the developer's b. the manager's c. the user's d. everybody's Question 8 1 out of 1 points A "bug", which has been discovered, and someone writes an automated script to execute the bug is called a(n) ________? Selected d. Answer: exploit Answers: a. flaw b. virus c. vulnerability d. exploit Question 9 1 out of 1 points Why is it important for developers to receive security training? Selected d. Answer: All of the above Answers: a. So they know to use the testing tools to build secure software b. So they understand the best practices to build secure software c. So they understand how a hacker thinks and misuses software d. All of the above Question 10 1 out of 1 points What is the cost of software defects annually in the United States? Selected c. Answer: $60 billion Answers: a. $40 billion b. $50 billion c. $60 billion d. $70 billion Quiz 10 - Question 1 1 out of 1 points From the following list of problems, select the two problems which are preventing the future growth of IoT devices? Selected a. Answers: Lack of consistent standards c. Lack of Internet bandwidth Answers: a. Lack of consistent standards b. Lack of manufactures c. Lack of Internet bandwidth d. Lack of consumer acceptance Question 2 1 out of 1 points Which of the following factors are important for choosing a language to code IoT devices? Selected d. Answer: All of the above Answers: a. Developer familiarity b. Availability of training c. Industry acceptance d. All of the above Question 3 1 out of 1 points Which of the following is a programming language for building IoT applications? Selected d. Answer: All of the above Answers: a. C/C++ b. Java c. C# d. All of the above Question 4 1 out of 1 points You can tell if an IoT device conforms with the AllSeen standard becasue the device will be _____________ certified Selected a. Answer: Alljoyn Answers: a. Alljoyn b. IEEE c. IoT-All d. None of the above Question 5 1 out of 1 points Accoring to a recent security study of IoT devices, what percent of them have insecure software that could be hacked? Selected c. Answer: 70% Answers: a. 27% b. 50% c. 70% d. 75% Question 6 1 out of 1 points "The IoT promises to improve our quality of life by allowing machines to make routine decisions on our behalf. The question we all must ask, as consumers, is how much privacy are we prepared to give up for convenience?" Selected Tru Answer: e Answers: Tru e False Question 7 0 out of 1 points Which of the following is the best explanation of the "Internt of Things" ? Selected b. Answer: Smart hardware connected to the Internet Answers: a. Hardware with computer chips and software b. Smart hardware connected to the Internet c. smart hardware that makes decisions which affect humans. d. All of the above Question 8 0 out of 1 points What is the biggest danger of the smart home? Selected d. Answer: None of the above Answers: a. hacking IoT devices to get personal information b. misconfigured devices that cause household fires c. robots that kill the homeowners d. None of the above Question 9 1 out of 1 points The Internt has not only been a benefit to us, but also to criminals. Which of the following are recommended protections from criminal activity? Selected d. Answer: All of the above Answers: a. Never buy goods from web sites generated by search engines b. Never open emails unless you vertify the source c. Always keep your anti-virus and anti-phishing software upto date d. All of the above Question 10 1 out of 1 points Apple is moving into the smart home in a big way. The new framework for developing IoT applications is called Selected a. Answer: HomeKit Answers: a. HomeKit b. HomeIoT c. HomeTime d. HomeSDK
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-