CS205 Quiz 1 Solved by VU Answer

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

VISIT ANY MORE FREELY SOLUTIONS

VUAnswer.com

CS205 QUIZ 1 SOLVED


Provide by VU Answer

1. Which of the following cis critical control is discussed in this module?


a) Secure configuration for network devices
b) Malware defense
c) Boundary defense
d) Data protection

2. Automated configuration monitoring tools should complaint with which


protocol to streamline reporting?
a) Ffiec
b) Disa
c) Cis
d) Scap

SUBSCRIBE OUR CHANNEL


https://www.youtube.com/channel/UCvFS8fAv4bvZsOmWu
WMIg3Q

JOIN WHATSAPP GROUP


https://chat.whatsapp.com/LgV0nsahhzhFE4bLd1TNHE
VISIT ANY MORE FREELY SOLUTIONS

VUAnswer.com

3. How can authorized wireless access point connected to a wired network


can be detected?
a) Through wireless instruction detection system
b) Through network-based intrusion detection system
c) Through file integrity monitoring solution
d) Through host-based data loss prevention (dlp)

4. In an enterprise which software’s should be allowed to install and


execute?
a) Any freely available software
b) Only paid software
c) Software’s displayed on notice board
d) Software’s included in whitelist

5. Why security engineering is placed at layer 3 of transformation model?

SUBSCRIBE OUR CHANNEL


https://www.youtube.com/channel/UCvFS8fAv4bvZsOmWu
WMIg3Q

JOIN WHATSAPP GROUP


https://chat.whatsapp.com/LgV0nsahhzhFE4bLd1TNHE
VISIT ANY MORE FREELY SOLUTIONS

VUAnswer.com

a) Consists of complicated security activities which take more time


and effort
b) Because it’s a low hanging fruit
c) Requires very less and effort
d) Its not very beneficial to implement so kept at the later stage

6. The dedicated machine used by administrators for administrative task


should have following features.
a) Have internet access
b) Email and browsing facility available
c) Isolated from organization primary network
d) All routine operational functions can be performed it

7. As per cis framework what is the best practice to store logs generated
from system?
a) Store logs on the same machine which generates
b) Store logs on a machine other than which generates

SUBSCRIBE OUR CHANNEL


https://www.youtube.com/channel/UCvFS8fAv4bvZsOmWu
WMIg3Q

JOIN WHATSAPP GROUP


https://chat.whatsapp.com/LgV0nsahhzhFE4bLd1TNHE
VISIT ANY MORE FREELY SOLUTIONS

VUAnswer.com

c) Store logs on different dispersed location


d) Aggregate logs to a central management system

8. As per cis critical controls from how many minimum synchronized time
resources all network devices and servers should retrieve time?
a) Three
b) One
c) Two
d) As many as possible

9. How can an authorized wireless access point connected to a wired


network can be detected and alerts can be generated?
a) Through network vulnerability scanning tools
b) Through file integrity monitoring solution
c) Through host-based data loss prevention (dlp)
d) Through network-based intrusion detection system

SUBSCRIBE OUR CHANNEL


https://www.youtube.com/channel/UCvFS8fAv4bvZsOmWu
WMIg3Q

JOIN WHATSAPP GROUP


https://chat.whatsapp.com/LgV0nsahhzhFE4bLd1TNHE
VISIT ANY MORE FREELY SOLUTIONS

VUAnswer.com

10. Before deploying any new devices in a networked environment what


should be done with passwords?
a) Remove the passwords
b) Keep the default passwords
c) Create very small passwords
d) Change the default passwords

SUBSCRIBE OUR CHANNEL


https://www.youtube.com/channel/UCvFS8fAv4bvZsOmWu
WMIg3Q

JOIN WHATSAPP GROUP


https://chat.whatsapp.com/LgV0nsahhzhFE4bLd1TNHE
VISIT ANY MORE FREELY SOLUTIONS

VUAnswer.com

Note:
If you found any mistake in quiz correct on it.
More solved quizzes, assignment, past paper free to visit
our website VUAnswer.com.
For help and suggestions contact us. We will provide best
solution freely soon as possible.

REGARD SARIM
WHATSAPP +923162965677

REMEMBER IN YOUR PRECIOUS PRAYERS

SUBSCRIBE OUR CHANNEL


https://www.youtube.com/channel/UCvFS8fAv4bvZsOmWu
WMIg3Q

JOIN WHATSAPP GROUP


https://chat.whatsapp.com/LgV0nsahhzhFE4bLd1TNHE

You might also like