COMP 129 DeVry Week 6 Quiz Latest

Downloading is very simple, you can download this Course here:


Contact us at:


COMP 129 DeVry Week 6 Quiz Latest


COMP 129 DeVry Week 6 Quiz Latest


COMP 129 DeVry Week 6 Quiz Latest

  1. Question : (TCO 8)The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
  • Kerberos
  • Crypto IP Encapsulation (CIPE)
  • Internet Protocol Security (IPsec)
  • Secure Sockets Layer (SSL)

Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.

  • ExpressCard
  • CardBus card
  • PCI card
  • PC Card

Question 3. Question : (TCO 8) A worm _____.

  • is a program that can replicate by attaching itself to another program
  • can spread copies of itself throughout a network without a host program
  • does not need a host program to work; It pretends to be a legitimate program
  • is dormant code added to software and triggered by a predetermined event

Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.

  • Authentication
  • Authorization
  • A background process
  • BIOS settings

Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.

  • Russian or Chinese hackers
  • college students studying hacking
  • employees leaving passwords in full view
  • disgruntled employees

Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?

  • Buy 1/0 rewrite software.
  • Drill holes in the platters and smash the pieces with a hammer.
  • Hold a magnet over each platter.
  • Repartition the hard drive into multiple partitions using different file systems.

Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.

  • user service
  • encryption
  • authentication
  • authorization

Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?

  • more
  • pwd
  • dir
  • ls

Question 9. Question : (TCO 9) What is SSID broadcasting?

  • The method the access point uses to reach all wireless NICs with a single message
  • A means for the access point to send the wireless encryption keys to all wireless NICs for network access
  • The access point constantly sending the name of the wireless network into the air
  • The access method used for 802.11 a, b, g, and n wireless networks

Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.

  • never lying.
  • good communications skills
  • a new customer discount
  • professionalism.