Networks of Information Security Context and Introduction
Week 3 of Networks of Information Security Context and Introduction
Question 1
Information being sent through a wired local network can be eavesdropped by: (multiple answers possible)
Question 2
Information being sent through a cellular network could be eavesdropped by: (multiple answers possible)
Question 3
Information being sent to the Internet through a WiFI local wireless access point can be eavesdropped by: (multiple answers possible)
Week 5 Review questions of Information Security Context and Introduction 1. Question 1 What security control from the list below would protect stored and transmitted data / information against…
Week 3 Network Security Systems of Information Security Context and Introduction 1. Question 1 A firewall: 1 point Filters incoming and outgoing packets based on a set of rules. Detects…
Week 4 ISO 27001 of Information Security Context and Introduction 1. Question 1 The ISO 27001 is: 1 point A standard that establishes the requirements for the implementation of an…
Week 4 Law and Regulations of Information Security Context and Introduction 1. Question 1 The implementation of an Information Security Management System requires us to identify the laws and legislations…
Week 3 Access Control of Information Security Context and Introduction 1. Question 1 An access control policy establishes: 1 point The model of access for a specific system. A method…
Week 4 Security Controls of Information Security Context and Introduction 1. Question 1 Select which of the items in the list can be considered as a category of security…