author bill buchanan author bill buchanan author bill
play

Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan - PDF document

Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author:


  1. Author: Bill Buchanan Author: Bill Buchanan

  2. Author: Bill Buchanan Author: Bill Buchanan

  3. Author: Bill Buchanan Author: Bill Buchanan

  4. Author: Bill Buchanan Author: Bill Buchanan

  5. Author: Bill Buchanan Author: Bill Buchanan

  6. Author: Bill Buchanan Author: Bill Buchanan

  7. Which package should you download to be able to access the tests: 25% 1. Packet Tracer 22% 2. Networksims.com 17% ProfSIMs 13% 13% 3. WebCT Analyser 10% 4. Security+ Net 5. Google Reader 6. iTunes Tester 1 2 3 4 5 6 Author: Bill Buchanan Author: Bill Buchanan

  8. To downloads the iTunes version of the lectures, which is the search term: 20% 1. AdvSecurity 17% 17% 17% 2. Napier 15% 15% 3. ASFN 4. SoC 5. AdvancedNapier 6. NetForensics 1 2 3 4 5 6 Author: Bill Buchanan Author: Bill Buchanan

  9. Which is not a subject taught on the module: 1. Cloud Computing 22% 20% 2. Compliance/Auditing 17% 17% 3. Web Infrastructures 13% 4. Threat Analysis 12% 5. Network Forensics 6. Data Hiding 1 2 3 4 5 6 Author: Bill Buchanan Author: Bill Buchanan

  10. Participant Scores 3 Participant 25 2 Participant F3D61 2 Participant 2 2 Participant 4 2 Participant 16 Author: Bill Buchanan Author: Bill Buchanan

  11. Author: Bill Buchanan Author: Bill Buchanan

  12. Author: Bill Buchanan Author: Bill Buchanan

  13. Author: Bill Buchanan Author: Bill Buchanan

  14. Author: Bill Buchanan Author: Bill Buchanan

  15. Author: Bill Buchanan Author: Bill Buchanan

  16. Which is a man-made/political threat : 25% 25% 25% 25% 1. Disgruntled employees 2. Outages 3. Earthquakes 4. Storms 1 2 3 4 Author: Bill Buchanan Author: Bill Buchanan

  17. Which is a technical threat : 25% 25% 25% 25% 1. Riots 2. Equipment outages 3. Earthquakes 4. Storms 1 2 3 4 Author: Bill Buchanan Author: Bill Buchanan

  18. Which is a prolonged power loss: 20% 20% 20% 20% 20% 1. Spike 2. Brownout 3. Sag 4. Fault 5. Blackout 1 2 3 4 5 Author: Bill Buchanan Author: Bill Buchanan

  19. Which is the term used for momentary high voltage: 20% 20% 20% 20% 20% 1. Spike 2. Brownout 3. Sag 4. Fault 5. Blackout 1 2 3 4 5 Author: Bill Buchanan Author: Bill Buchanan

  20. In a multi-story building, where is likely to be the best place to locate the data centre: 25% 25% 25% 25% 1. In the basement 2. On the top floor 3. On the middle floor 4. On the outside of the building 1 2 3 4 Author: Bill Buchanan Author: Bill Buchanan

  21. Author: Bill Buchanan Author: Bill Buchanan

  22. Author: Bill Buchanan Author: Bill Buchanan

  23. Author: Bill Buchanan Author: Bill Buchanan

  24. Author: Bill Buchanan Author: Bill Buchanan

  25. Author: Bill Buchanan Author: Bill Buchanan

  26. Author: Bill Buchanan Author: Bill Buchanan

  27. Author: Bill Buchanan Author: Bill Buchanan

  28. Author: Bill Buchanan Author: Bill Buchanan

  29. Author: Bill Buchanan Author: Bill Buchanan

  30. Author: Bill Buchanan Author: Bill Buchanan

  31. Author: Bill Buchanan Author: Bill Buchanan

  32. Author: Bill Buchanan Author: Bill Buchanan

  33. Author: Bill Buchanan Author: Bill Buchanan

  34. Author: Bill Buchanan Author: Bill Buchanan

  35. Author: Bill Buchanan Author: Bill Buchanan

  36. Author: Bill Buchanan Author: Bill Buchanan

  37. Author: Bill Buchanan Author: Bill Buchanan

  38. Author: Bill Buchanan Author: Bill Buchanan

  39. Author: Bill Buchanan Author: Bill Buchanan

  40. Which infects computer systems with the intentionally to copy themselves onto other systems 25% 1. Viruses 20% 2. Trojans 18% 18% 3. Logic bombs 13% 4. Worms 5. Bots 6. Rootkits 5% 1 2 3 4 5 6 Author: Bill Buchanan Author: Bill Buchanan

  41. Which pretends to be a useful application, but has malicious intent 1. Viruses 2. Trojans 3. Logic bombs 4. Worms 5. Bots 6. Rootkits Author: Bill Buchanan Author: Bill Buchanan

  42. Participant Scores 3 Participant 2 3 Participant 4 3 Participant 25 2 Participant F3D61 2 Participant 14 Author: Bill Buchanan Author: Bill Buchanan

  43. Author: Bill Buchanan Author: Bill Buchanan

  44. Author: Bill Buchanan Author: Bill Buchanan

  45. Author: Bill Buchanan Author: Bill Buchanan

  46. Author: Bill Buchanan Author: Bill Buchanan

  47. Author: Bill Buchanan Author: Bill Buchanan

  48. Author: Bill Buchanan Author: Bill Buchanan

  49. Author: Bill Buchanan Author: Bill Buchanan

  50. Author: Bill Buchanan Author: Bill Buchanan

  51. Author: Bill Buchanan Author: Bill Buchanan

  52. Author: Bill Buchanan Author: Bill Buchanan

  53. Author: Bill Buchanan Author: Bill Buchanan

  54. Author: Bill Buchanan Author: Bill Buchanan

  55. Author: Bill Buchanan Author: Bill Buchanan

  56. Author: Bill Buchanan Author: Bill Buchanan

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend