3-0 Check Your Knowledge - IT-200-J2028 Fundamentals Info Technology 21EW2 PDF

Title 3-0 Check Your Knowledge - IT-200-J2028 Fundamentals Info Technology 21EW2
Course Fundamentals of Information Technology
Institution Southern New Hampshire University
Pages 5
File Size 101.3 KB
File Type PDF
Total Downloads 104
Total Views 141

Summary

check your knowledge quiz module 3. Answers with feedback...


Description

Stephanie Rowell (username: [email protected]) Attempt 2

Written: Nov 11, 2021 2:37 AM - Nov 11, 2021 2:52 AM Submission View

Your quiz has been submitted successfully.

Question 1

0 / 1 point

What is secure socket layer (SSL) and transport layer security (TLS)? Select one.

A component of synthetic logging An authentication process Types of LAN SSL and TLS are the first line of defense to protect private information sent over the internet.

Hide Feedback

SSL and TLs are the first line of defense to protect private information sent over the internet.

Question 2

1 / 1 point

Which of the following best describes an Enterprise Resource Planning (ERP) tool? Select one.

A software application with a centralized database that allows various divisions in an enterprise to work together using the same data. A tool that forecasts future earnings for the organization A library of stored data for the organization An application used for processing all financial transactions

View Feedback Question 3

1 / 1 point

Which of the following terms are related to systems thinking? Select all that apply.

Proxy diagram Causal loops Simulation model Cognitive load

View Feedback

Question 4

1 / 1 point

The ISO 9000 certification is focused on quality management. True False View Feedback

Question 5 What are the five basic topology types? Select all that apply.

1 / 1 point

Bus Ring Triangle Cloud Star Tree Mesh

View Feedback

Question 6

1 / 1 point

Protocol refers to a set of rules that coordinates the exchange of information. True False View Feedback

Question 7 How does a proxy server work? Select one.

It routes messages to another computer. It diverts harmful information into a secure folder. It automatically deletes harmful material entering the computer. It stops all incoming and outgoing traffic before forwarding it.

View Feedback

1 / 1 point

Question 8

1 / 1 point

What is a challenge facing information security today? Select one.

The number of devices available Corporate systems are generally designed for performance, not security An abundance of security measures A lack of IT Professionals

View Feedback

Question 9

1 / 1 point

What benefit does a Case Diagram provide? Select one.

Written documentation detailing out the process Difficult to decipher messages in the process It can provide an overview of the actors in a system, the functions of a system, the flow of data, and ultimately, how they all interact Demonstrates the low and high points of the revenue cycle.

View Feedback

Question 10

1 / 1 point

Phishing typically uses appeals to persuade, trick, block, or download information from its victims. True False Hide Feedback

True- Phishing typically uses appeals to persuade, trick, block, or download information from its victims.

Done

Attempt Score:

9/10-A-

Overall Grade(highest attempt):

9/10-A-...


Similar Free PDFs