TLE 10 CSS Q2 Summative Test 2 Performance Task 2
TLE 10 CSS Q2 Summative Test 2 Performance Task 2
______ 1. What type of threats attacks that steal, damages, or destroy equipment such as server?
a. Physical b. Chemical c. Mental d. Biological
______ 2. What type of threats removes, corrupts denies access to, allows access to or steals information?
a. Data b. Information c. Software d. Program
______ 3. What potential threat is referred to employees who have access to data, equipment and the
network?
a. External b. Inner c. Internal d. Outer
______ 4. What internal threat is referred when an employee intends to cause damage?
a. Incidentalb. Malicious c. Crucial d. Accidental
______ 5. What internal threat is referred when the user damages data or equipment unintentionally?
a. Incidentalb. Malicious c. Crucial d. Accidental
______ 6. What potential threat is referred to users outside an organization who do not have authorized
access to the network or resources?
a. External b. Inner c. Internal d. Outer
______ 7. What external threat uses available resources such as password or scripts to gain access?
a. Unconstruction b. Unstructured c. Construction d. Structured
______ 8. What external threat uses code to access operating system and software?
a. Unconstruction b. Unstructured c. Construction d. Structured
______ 9. What program is created with malicious intent and send by attackers?
a. Games b. Software c. Virus d. App
______ 11. What is referred to a way of protecting a computer from intrusion through the ports?
a. Network b. Firewall c. Anti-spam d. Antivirus
______ 13. What type of wave does the traffic flows through in a wireless network?
a. Light Waves b. S-Waves c. Radio Waves d. Microwaves
______ 14. What was the first generation security standard for wireless?
a. WAP b. WPA c. LEAP d. WEP
______ 15. What type of signal which an attacker can access data travels?
a. Cable Signal b. Wifi Signal c. TV Signal d. Radio Signal
______ 16. What wireless security protocol created by Cisco to address the weakness of WEP and WPA?
a. LEAP b. WAP c. WTLS d. WNIC
______ 17. What wireless security created as a temporary solution until 802.11 was fully implemented?
a. WPA b. LEAP c. WAP d. WEP
______ 18. What wireless security is an enhanced encryption protocol combining a 104 bit key and 24 bit
initialization vector?
a. WEP 128 b. WEP 64 c. WEP 256 d. WEP 512
______ 19. What wireless security could be exploited because of an encryption key that was vulnerable to
decoding?
a. WEP 128 b. WEP 64 c. WEP 256 d. WEP 512
______ 20. What security layer is used in mobile device that employ the wireless application protocol?
a. WPA b. LEAP c. WTLS d. WNIC
Good Luck!!!
Sir Lance…..
Readable but
Output is very neat Readable but has
Neatness of work contains some
and readable many erasures
erasures
- 2-