CIS 297 Wk 4 Apply – Module 17 Review Quiz

0 items
CIS 297 Wk 4 Apply - Module 17 Review Quiz
CIS 297 Wk 4 Apply – Module 17 Review Quiz
$6.00
  • Description

CIS 297 Wk 4 Apply – Module 17 Review Quiz

Click MindTap Access in the Course Content section to locate the quiz.

Complete the Module 17 Review Quiz in the Apply section of Week 4: Securing Data and Networks.

Note: You have three attempts to complete the quiz. Your best score will be final.

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated?

 

  1. PII

 

 

  1. PHI

 

 

  1. PCI

 

 

  1. GDPR

 

 

 

What type of employee badge does not have to be swiped by a card reader in order to allow the employee through a door?

 

  1. RFID badge

 

 

  1. Smart card badge

 

 

  1. A badge containing a digital certificate

 

 

  1. Key fob

 

 

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

  1. Turn off system protection.

 

  1. Update installed anti-malware software.

 

  1. Format the hard drive.

 

  1. Quarantine the computer

 

 

 

What tool is best to use when destroying data on an SSD?

 

  1. Zero-fill utility

 

 

  1. Low-level format

 

 

  1. Degausser

 

 

  1. ATA Secure Erase

 

 

You sign in to your personal computer with your Microsoft account and then you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called:

 

  1. Multifactor authentication

 

 

  1. Mutual authentication

 

 

  1. Biometric authentication

 

 

  1. None of these

 

 

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?

 

  1. Risk analysis documents

 

 

  1. Back-out plan documents

 

 

  1. Change management documents

 

 

  1. Scope of change documents

 

 

What is the best way to determine if an email message warning about a virus is a hoax?

 

  1. Check websites that track virus hoaxes.

 

 

  1. Scan the message for misspelled words or grammar errors.

 

 

  1. Open the message and see what happens.

 

 

  1. Scan your email inbox for malware.

 

 

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes and you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first? Explain why this is your first choice.

 

  1. Try a data-recovery service even though it is expensive.

 

 

  1. Remove the hard drive from the computer case and install it in another computer.

 

 

  1. Try GetDataBack by Runtime Software (runtime.org) to recover the data.

 

 

  1. Use Windows utilities to attempt to fix the Windows boot problem.

 

 

  1. Run antivirus software to remove the virus.

 

 

Among the following, which is the best protection against ransomware?

 

  1. Windows File History

 

 

  1. Carbonite

 

 

  1. Keylogger software

 

 

  1. Authy by Twilio

 

 

As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financial data. Which of the following services is most likely the one you are using to authenticate to the network and track what you do on the network?

 

  1. RADIUS

 

 

  1. Secure DNS

 

 

  1. Active Directory

 

 

  1. TACACS+