Copyright
Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Computer Science 202: Network and System Security Final Exam

Free Practice Test Instructions:

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Question 1 1. Which government agency originated the concept of information security?

Question 2 2. Which of the following is TRUE about an information security management system (ISMS)?

Question 3 3. Which section of an information security framework ensures that the firm follows all applicable state and federal laws?

Question 4 4. Which discipline of information security deals with accounts, certificates, and permissions?

Question 5 5. Anything that can negatively affect an information system is known as a(n) _____.

Question 6 6. Which element of the CIA triad refers to keeping information out of the hands of people who are not authorized to have it?

Question 7 7. What kind of network policy validation would involve giving computer systems immediate access to the network before those computers implement required updates and configuration changes?

Question 8 8. Which organization developed Kerberos encryption?

Question 9 9. Why is the discretionary access control model the most restrictive?

Question 10 10. How is restricted access indicated in an access control matrix?

Question 11 11. What is an essential part of establishing a VPN?

Question 12 12. Why would a business want to consider using vendor supported recovery strategies in the event of an IT disaster?

Question 13 13. Which layer of the OSI Model is responsible for flow control?

Question 14 14. How do firewall access policies control information?

Question 15 15. Which layer of the OSI Model includes software that end users interact with?

Tell us about yourself

Are you a student or a teacher?

I am a student I am a teacher

Computer Science 202: Network and System Security Final Free Practice Test Instructions

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Support