Copyright
Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Network Auditing & Configuration Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Which of the following is NOT a method for intrusion detection?

Question 2 2. Which of the following is NOT a characteristic of an intrusion detection system?

Question 3 3. What is one difference between configuration control and change control?

Question 4 4. What is one benefit of version control?

Question 5 5. Which statement below is NOT one of the steps in the risk management framework?

Page 2

Question 6 6. Which statement is an input for the risk management plan process?

Question 7 7. Kelly and her team have a Cisco ASA device in their health club. A review of their logs indicated that their device was attacked and a malicious code executed. so they took the appropriate steps. This is an example of: _____

Question 8 8. Brian is configuring a Cisco ASA device for his gym. What security feature should he enable to allow mobile users to connect securely to the gym network through VPN?

Question 9 9. The three stages in Kurt Lewin's change model are:

Question 10 10. _____ is the best approach for companies that are planning careful, sequential changees, while _____ is best for companies that are implementing simpler changes.

Page 3

Question 11 11. If an intrusion prevention system identifies malicious traffic trying to enter a computer network, which of these steps might it take?

Question 12 12. Dropping _____ refers to eliminating pieces of malicious data trying to be delivered to a network.

Question 13 13. The component of a configuration management plan that establishes boundaries and guidelines is listed in which option below?

Question 14 14. Having strict access control requiring check-in and check-out procedures to and from the CM database is a much needed CM feature. Which option below best identifies where this capability can be found and made available?

Question 15 15. On a Cisco ASA device _____ should be used to block files, links and websites that are not known to be dangerous but can potentially be dangerous from being accessed.

Page 4

Question 16 16. Larry is installing a Cisco ASA device. He is looking for a power switch to turn the device on but cannot find one. This is because: _____

Question 17 17. What does the acronym PDCA, as in the PDCA cycle, stand for?

Question 18 18. What does ISO9001 say about continual improvement?

Question 19 19. Which of the following is NOT an intention of a control framework?

Question 20 20. Why would you want to implement a controls framework like COBIT?

Page 5

Question 21 21. Which of the following is NOT something a network security audit looks at?

Question 22 22. Which of the following network security audit tools is a suite, not a utility?

Question 23 23. Identify the business situation that will require an urgent change plan.

Question 24 24. How is the effectiveness of a change plan evaluated?

Question 25 25. According to ISACA guidelines _____ is the phase where documentation and review takes place.

Page 6

Question 26 26. Jeannie is working on the planning phase of an audit following the ISACA guidelines. Which of the following processes she should complete during this phase?

Question 27 27. If a company with a very low budget needs to lease a public IP address to access the Internet what would you advise and why?

Question 28 28. The different types of Address Translations are _____

Question 29 29. Which of the following is a characteristic of data security?

Question 30 30. A company specializing in electrical fittings was finding that they had a number of items that were incompatible. Joe is the new manager of the company. What can he do to make sure such errors can be prevented in the future?

Network Auditing & Configuration Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support