Title | 3-0 Check Your Knowledge - IT-200-J2028 Fundamentals Info Technology 21EW2 |
---|---|
Course | Fundamentals of Information Technology |
Institution | Southern New Hampshire University |
Pages | 5 |
File Size | 101.3 KB |
File Type | |
Total Downloads | 104 |
Total Views | 141 |
check your knowledge quiz module 3. Answers with feedback...
Stephanie Rowell (username: [email protected]) Attempt 2
Written: Nov 11, 2021 2:37 AM - Nov 11, 2021 2:52 AM Submission View
Your quiz has been submitted successfully.
Question 1
0 / 1 point
What is secure socket layer (SSL) and transport layer security (TLS)? Select one.
A component of synthetic logging An authentication process Types of LAN SSL and TLS are the first line of defense to protect private information sent over the internet.
Hide Feedback
SSL and TLs are the first line of defense to protect private information sent over the internet.
Question 2
1 / 1 point
Which of the following best describes an Enterprise Resource Planning (ERP) tool? Select one.
A software application with a centralized database that allows various divisions in an enterprise to work together using the same data. A tool that forecasts future earnings for the organization A library of stored data for the organization An application used for processing all financial transactions
View Feedback Question 3
1 / 1 point
Which of the following terms are related to systems thinking? Select all that apply.
Proxy diagram Causal loops Simulation model Cognitive load
View Feedback
Question 4
1 / 1 point
The ISO 9000 certification is focused on quality management. True False View Feedback
Question 5 What are the five basic topology types? Select all that apply.
1 / 1 point
Bus Ring Triangle Cloud Star Tree Mesh
View Feedback
Question 6
1 / 1 point
Protocol refers to a set of rules that coordinates the exchange of information. True False View Feedback
Question 7 How does a proxy server work? Select one.
It routes messages to another computer. It diverts harmful information into a secure folder. It automatically deletes harmful material entering the computer. It stops all incoming and outgoing traffic before forwarding it.
View Feedback
1 / 1 point
Question 8
1 / 1 point
What is a challenge facing information security today? Select one.
The number of devices available Corporate systems are generally designed for performance, not security An abundance of security measures A lack of IT Professionals
View Feedback
Question 9
1 / 1 point
What benefit does a Case Diagram provide? Select one.
Written documentation detailing out the process Difficult to decipher messages in the process It can provide an overview of the actors in a system, the functions of a system, the flow of data, and ultimately, how they all interact Demonstrates the low and high points of the revenue cycle.
View Feedback
Question 10
1 / 1 point
Phishing typically uses appeals to persuade, trick, block, or download information from its victims. True False Hide Feedback
True- Phishing typically uses appeals to persuade, trick, block, or download information from its victims.
Done
Attempt Score:
9/10-A-
Overall Grade(highest attempt):
9/10-A-...