Abioti

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

PREMIUM COLLEGE

Individual assignment submission date 05/04/2015


Monitor and administer system and network security
Name: Endale Girum ID: 018/14 Section: C2
UNIT TITLE: MONITOR AND ADMINISTER SYSTEM AND NETWORK SECURITY
PART I: KNOWLEDGE PART
SECTION I
Instruction: This assessment contains 5 matching type questions, each worth 2 point. Match the item in
column “A” with the item in column “B” and wrote letter of the best match on the space provided. Use
only capital letters
Column A Column B
_____1. Hardware loss A. Password Attacks
_____2. May not be the biggest risk B. Virus
_____3. One of the worst security threats C. Trojan Horses
_____4. Can’t run itself D. Maliciously Coded Websites
_____5. Programming code that is capable of E. Packet Sniffers:
causing harm to availability F.Phishing:
G. Hard drive theft
H. SPAM
SECTION II
Instruction: This assessment contains 17multiple choice questions, each worth 2 point. Match the item in
column “A” with the item in column “B” and wrote letter of the best match on the space provided. Use
only capital letters

_____1. A process of determining what activities or access will be permitted for user is _______?
A. Authorization C. User
B. Authentication D. Privilege
_____2. The prevention and protection of network assets from unauthorized access, unauthorized use and
Alteration is called _______?
A. Authorization C. Authentication
B. Network security D. Intrusion detection

_____3. A client needs to share a Network resource with permission that enables the user read, write and
change. What would your advice for him?
A. Read C. Full control
B. Write D. Read/Write
_____4. The ability to access and use information is called_______?
A. Security policy B. Confidentiality
C. Availability D. Integrity
_____5. Confidentiality means?
A. Keeping information safe and secrete C. the ability to access and use
B. The information must be accurate information
D. all of the above
_____6. A person responsible for the maintenance of computer hardware and software that comprises a
computer network_____?
A. Network engineer C. Network analyst
B. Network administrator D. All of the above
_____7. The process identifying the identity of a user is _____________
A. Authorization C. Authentication
B. Network security D. Network security

_____8. A user or computer account is used to____________


A. Authenticate the identity of a user or computer.
B. Authorize or deny access to domain resources.
C. Administer other security principals
D. All of the above
E. None of the above
_____9. One of the following in true about security group?
A. When first created, it receives an SID (security ID)
B. Are created to share information with a group of users through e-mail messages.
C. does not obtain an SID when it is created
D. none of the above
_____10. Which one of the following statement is true?
A. Global groups are containers for user accounts and computers accounts in the domain.
B. Domain local groups can have user accounts, computer accounts, global groups, and universal
groups from any domain as group members.
C. Universal groups can have user accounts, computer accounts, global groups, and other universal
groups from any domain in the tree or forest as members
D. All of the above
E. None of the above
_____11. The policy that is configured at the Active Directory level and is inherited by the domain member
Computers
A. Policy domain C. Active directory
B. GPO D. All of the above
_____12. The activities, methods, procedures, and tools relevant to the operation, administration,
Maintenance and provisioning of networked systems is __________?
A. Network configuration D. all of the above
B. Network management E. none of the above
C. network engineer
_____13. The correctness of information is refers to_____________?
A. Security policy C. Availability
B. Confidentiality D. Integrity
_____14. A security policy should contain one of the following except
A. understandable D. enforceable
B. realistic E. None of the above
C. consistent
_____15. Measures taken to protect certain things or elements of information. There are three main elements is
_________?
A. Confidentiality D. Security
B. Availability E. None of the above
C. integrity
_____16. Which one of the following is not a security solution?
A. Access control lists C. Authorization
B. Use proxy server D. All of the above

PART III:
PRACTICAL PART
Instruction: This assessment / exam contain 3 Questions; worth 8 points. Read and analyze each question
carefully so that when you understood, answer the questions correctly. Try to write neatly and proofread
as you go.
1. List 3 examples of network resource. 3pt
a. ____________________________b_____________________________c___________________
2. List and explain different security solution? 3pt
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
___________________________________________________________________________
3. Assume that you are working as a network administrator in ABC Company. What will you think will be
your responsibility? 2pt
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
___________________________________________

You might also like