Thursday, October 31, 2019

The Rise To Management Assignment Example | Topics and Well Written Essays - 250 words

The Rise To Management - Assignment Example Although theory forms the basis of nearly all the research; yet the way in which theories are developed varies a lot. Research that gives rise to management issues can be carried out in a number of ways, some of which are mentioned in this work and include establishing causal relationships, evaluating the efficacy of approaches to various problems and derivation of results by the use of descriptive studies.The problem of pharmaceutical companies regarding the loyalty of their customers can well be addressed by the use of smartphone app, as it provides a means of information exchange at very personal level. However, the suggested framework for the purpose of revealing the underlying nature of the problem may prove to be beneficial only if the users of the app are convinced enough to participate in the activity that relates to the provision of personal information for the purpose. Since this is largely a matter of personal choice and preference, and no clear-cut incentive is involved i n the process, the likelihood of this method's success is questionable. Additionally, the approach of quantitative examination leading to the qualitative understanding of the nature of Jamaican consumers raises questions regarding the feasibility of the approach. Will the outcomes obtained as a result of the implementation of this approach be reproducible and applicable in the long run? Also interesting to note is the presumed relationship of the success of smart-phone app to the sales of branded products.

Tuesday, October 29, 2019

Evidence and support for your claim Essay Example | Topics and Well Written Essays - 1000 words

Evidence and support for your claim - Essay Example When talking about violence in media, advocates against violence state that they are pushing for more censorship in behalf of the youth. A study has shown that children who were non-violent showed a high level of brain activity similar to that of children with aggressive behavior. (Mathis, 2005) More research has to be conducted to ensure that the brain activity was a direct result of exposure to violent television shows. Nevertheless, theories on behavioral psychology explain that an individual’s behavior can be influenced by a number of things, one of which is through observance of the actions in his or her surroundings. As a child, the individual tends to mimic what he or she sees from the adults around him. (Observation, 2005) Children usually imitate behavior and language from the people around them. This is how they start learning to communicate. As such, adults are often mindful of how they act and what they say whenever around very young children. This is also why parents have their kids watch educational children’s shows. They are in the frame of mind that their children will pick up the words and lessons from the said shows. This way of thinking can also be applied when it comes to violent shows. By having children watch shows with gun-wielding teenagers, people fighting and individuals shouting foul words, media is sending a message that it is normal to act as violently. Media is reinforcing the notion that fighting is acceptable in society. It provides the young viewers role models who exhibit aggressive behavior. Producers of the show maintain that they cannot do away with action scenes and aggressive behavior as these will affect the quality of their shows. They may say that it is the responsibility of the parents to supervise what their children are watching. Also, they may say that their shows are classified for adult viewers who know the difference

Sunday, October 27, 2019

Students Perception On Fast Food Consumption

Students Perception On Fast Food Consumption Malaysians were first introduced to fast foods when AW established its first restaurant in 1963. Consumers acceptance of fast foods has been increasing. This is manifested by the proliferation of fast food outlets in Petaling Jaya and Kuala Lumpur, such as Mc Donalds, Kentucky Fried Chicken (KFC), Grandys, Pizza Hut and Shakeys Pizza. Especially during the past ten years. These restaurants are franchised outlets that serve standardised western style menus, prepared according to strict specifications and charge fixed prices. Nowadays, many Malaysian are becoming increasingly more westernized and pursuing greater convenience when eating out. For these reasons, fast food restaurants have become especially popular among adolescents. In fact, the main customer group of fast food restaurants is students. Primary school student will request for fast food such as Mc Donald, KFC or Pizza Hut when they spend their family day with parents. While for teenager, they love fast food because its a nice place for them to hang out with friends and chit chat with. Several dietary factors inherent in fast food may cause a variety of negative health effects, including obesity, hypercholesterolemia, cardiovascular disease and some cancers due to massive portion of fast food, high energy density, palatability (appealing to primordial taste preferences for fats, sugar and salt), high content of saturated and trans fat, and low content of fibre. In order to induce students to have a correct understanding of the problems associated with fast food and to form a good dietary habit, it is necessary to realize how they perceive the influence of fast food on their health and nutrition. The purpose of this study is to examine Malaysian students perceptions and towards fast foods. A better understanding of the behavioural and psychosocial factors associated with eating fast food could provide useful descriptive information for potential intervention development. LITERATURE REVIEW This research paper is not undertaking as a substantial survey either of brand building or of consumer experience. Nor is it seeking the perception of student to fast food. Brands enhance human daily life. Consumers experience of using their familiar brands is more comfortable. This is because the essence of branded eating in fast food restaurants, albeit inflected culturally in different direction. Students consume the same brand as they friends did. This had brought out the trend among students which fast food restaurant is a place to hang out. According to Schlosser (2001) with increased mobility and the sprawling of urban areas people spent more time commuting to work. This was coupled with an increasing presence of women in the workplace thus leading to less time allocated for food preparation at home. At that stage, some three quarters of the family food budget was initially spent on fast food meals. Quick to capture the changing nature of the business, the fast food industry has also changed the face of the food chain in the last decades. Changes in food presentation and preparation were derived from technological improvements that facilitated the preservation of both uncooked and precooked foods. The advent of the microwave helped with the rapid preparation of food. As well as food preparation, the presentation of food also went through transformation. Outlets that were relied highly on staff and the use of crockery or cutlery gave way to a strong eat with your fingers emphasis. In addition to this, technological advances in packaging allowed the ultimate use of disposal of materials made of plastic, cardboard and polymers. These came in tandem with a drive towards uniformity of expectations, which included not only the presentation of the food itself, but also radical changes to the fundamentals of traditional restaurant (Schlosser 2001). Rault-Wack and Bricas (2002) propose that food is also a powerful medium for the construction of cultural and collective identities. Therefore, by establishing a corporate identity through the use of architectural symbolism such as red tiles and neon arches (Jackle and Scalle, 1999), the overall result meant that a particular name would be immediately associated with a particular product and service. As a result a strong brand association and identification was established facilitating the formation and consolidation of strong corporate identities. In the UK, fast food preparation and presentation thus follows the American model which created a strong cultural and collective identity. The model has provided the consumers with uniformity and repeated experience (Schlosser 2002). According to Anita Goyal and N.P. Singh survey, Consumers perception on fast foods in India had mention that after the liberalisation policy that came in force in 1991. Fast food industry grown in India as multinational fast food providers have set up their business either jointly with Indian partners or independently. From this journal was seeks to estimate importance of various factors affecting the choice of fast food outlets by Indian young consumers. According to the findings of the recent online survey from AC Nielson is among the top ten markets for weekly fast food consumption among the countries of Asia-Pacific region. Over 70 % of customers consume food from take-away restaurants once a month or more frequently. Identifying the drivers for preference of one-brand over another, the survey results indicate that 66% of customers who consider hygiene and cleanliness their most important criterion for selection. 24% of customers decide making criterion to purchase a fast food brand offer and 22% rely on their perception of whether a take-away brand offers them healthy food options. Other than that, youngest consumers are looking for variety, price, speed, delivery service and location in America and for price and novelties as well. Older consumers are more concern to cleanliness, nutritional value, quality and taste. According Tony Wilson and Khor Yoke Lim (2005), fast food culture has become a trend in the world. Even the state of ones health has become primary concern for consumer, but it does not affect the way consumers choose to eat. Having fast food becomes a part of student life. If current trend continue and forecast correct three quarters of todays teenage will be overweight or obese by the time they turn in 40 years old. Malaysia fast food industry is growing and attributed with the changing in life such as leisure and people life more convenience compare to years ago. Consumer have been spending less of their budget on the grocery store while spending more of their food money is ending up in cash register at the restaurant and fast food outlets. Besides that, convenience was another good perception view from public to fast food. Working adult willing to purchase fast food as their lunch or dinner due to its efficient for getting their meal and also its value packages which provided by fast food restaurant. Other than that, normally, fast food restaurant based in or near shopping complex or office building. This had build another good reason while employees are rushing for their lunch hour and they are much more prefer to have fast food in 15 minutes to enjoy for their one hour lunch time. Nowadays, people are more concern to health condition compare to years ago. Therefore, in long term healthy eating will be effective in reducing the risk of community towards chronic diseases such as obesity, diabetes, hypertension, cardiovascular diseases and certain types of cancer. Guidelines on fast foods are advertising to children and labelling of nutrient content. The increasing circulation of obesity among children is also a main reason. Nutrition labelling is to provide nutrition information on wrapper, brochure, pamphlet or posters of fast food. Consumers will be informed of the amount of the nutrients contains. Therefore, education towards consumer on the use of nutrition labelling information must to carry out to ensure effective use of the declaration. PROBLEM STATEMENT A problem statement is a clear concise description of the issues that need to be addressed by a problem solving team and should be created before they try to solve the problem. When bringing together a team to achieve a particular purpose provide them with a problem statement. In this students perception towards consuming of fast food, students believes that fast food are convenience and efficient. This is the factors that lead to the drastic increase in the statistical analysis on fast food consumption in Malaysia. This is because they had already set in mind fast food is convenient and less time consuming to purchase compare to a proper restaurants. Finally, fast food has become a basic social lifestyle as students treat a fast food restaurant as a place for gather and hang out. Research Question Research question 1: What is the perception of students on fast food? Hypotheses 1: Fast food is convenient and less time consuming Hypotheses 2: Fast food is place for gatherings and hangs out. Research question 2: What are the factors that influencing fast food consumption? Hypotheses 1: Fast food increases the obesity rate in Malaysian. Hypotheses 2: Fast foods foods are lack of nutrient and might causes health matters if consume in a long term. Research Objective The main objective of this research is to conduct a conclusive research to explore insights about students perception on fast food consumption. We want to know the student perception on fast food consumption and how this perception influencing them to consume a fast food as their meal. This research is also to identify and analyze the factors that influencing student on fast food consumption. The factors that influencing students fast food consumption can be in terms of price of the fast food, nutrition of the fast food, convenience and lifestyle. Price of fast food is an economic factor that influence them the most whether to consume fast food. This depend whether they got extra pocket money which usually come from their parents. Nowadays, fast food is one of the foods that students consume every day. Nutrition of fast food is taking into consideration for students healthy. This research is also conducted to find out whether student consume fast food is because of the convenience to get the fast food and eating fast food is kind of lifestyle. In short, the final analysis should give us what factors that influence the students on fast food consumption hence fast food restaurants can take the findings of this research as a guide to improve their services or make more profit. Research Framework Independent Moderating Dependent Variables Variable Variable Price of Fast Food Student consumption of Fast Food in Malaysia Students attitude towards Fast Food Demographic Nutrition of Fast Food Convenience of Fast Food This survey indicates that students consumption on fast food in Malaysia are affected by several variables which are price of purchasing fast food, trend or lifestyle of student, nutrition that contains and the convenience of the fast food. Refer to the framework, these 4 variables are important because either one of the variable will cause the perception of student to consume on fast food. Besides, all the variables had been affected by moderating variable, demography. The demography is include age, gender, income race and others demography that related to student consumption on fast food. Therefore, we take it as our independent variables for this research. Price The price is a component of an exchange or transaction that takes place between two parties and refers to what must be given up by one party (example: buyer) in order to obtain something offered by another party (example: seller). Price factors are said to influencing most of the students perception is because of the allowance from their parents are very minimal and students perception in purchasing fast food are believed to be expensive and not full filling. Sometimes, student will purchase fast food because of the price is reasonable for certain portion of the fast food. Therefore, the price is the perception of the student in fast food consumption. Attitude Besides, attitude is also an independent variable for the student perception on fast food. Attitudes is kind of manner, disposition, feeling posture of the body to expressive of an action, emotion regards to a person. This can be show that student attitudes towards Fast food are treating Fast food restaurant as a place for gatherings. Students nowadays like to hang around with friends at fast food restaurant compare library; they think that this is a part of their life or so called cool. Besides, student for high institution will spend more time at fast food restaurant to do their assignment, surf net, chit chat with their friend and so on, where all these activities can be doing at home, library or any parts of the campus. Nutrition Nutrition is nutrients in food, how the body uses nutrients, and the relationship between diet, health and disease. This is important to know what is the nutrition of the fast food contains and found out there is a poor nutrient value from the fast food. It is not only contains a very high calorie in some certain amount of fast food, it contains high monosodium glutamate (MSG), as a food additive and is commonly marketed as a flavour enhancer that is bad for health if it is highly consumed and fast food is of the leads to obesity among teenagers these days. Do students now a day refer to any nutrition labels before they purchase fast food and will the student aware of health if they have their fast food frequently? So, nutrition is very important for student perception on fast food that might influence student consumption to have fast food. Convenience Following is convenience of fast food. Convenience is anything that is intended to save resources (time, energy) or frustration. Convenience is one of the factors that most students do go for fast food as they think fast food is very convenient and less time consuming. In the students mind set of fast food is a place for everyone to visit there at anytime anywhere. Compare to a normal restaurant which need to wait for long queue just for waiting waitress to serve and order. However, fast food just need a few minutes where students can enjoy their meals without wasting time and energy. This is why fast food brings convenience to student. Research Methodology In this research, our main finding is factors that cause students perception from higher education institution in the fast food consumption. Most of the students are having pocket money that provided by their parents, money that students spend will automatically been limited due to amount of parents give to them, so we want to find out that price will change student perception in fast food area. Besides price factor, we also will focus on the convenience and attitude of students that influence their perception on fast food consumption. In addition, current condition in nutrition or health knowledge is also important to us to know that students will be affect by the nutrition knowledge when they want to consume fast food. Why So, we can use our finding to exploit our knowledge on perception of students on fast food consumption and it may also useful in future too. Population Sampling Students who consumed food obtained in fast food restaurants in Malaysia. Sample Sampling Our sample is students from Higher education Institutions. This is because, student in higher education level, their minded is much more mature to make decision. While our target number of students is 100 for direct collect survey which just for Wilayah Persekutuan and Selangor. This is because; higher education institutions are more locating in these 2 areas. But we not set a target for our online survey, this is because online survey hard to us to estimate it and we also have confidence that we sure can get many respondents. So, after conduct the online survey we just know that how many of respondents gather in online. Technique We will use survey method to collect or gather our data, due to the reason of survey is the easy way to give students to answer comparing with others techniques that quite complicated; moreover it is the inexpensive way to gather form a potentially large enough to respondents. Often they are the only feasible way to reach a number of reviewers large enough to allow statistically analysis of the results. We had separated our questionnaire into 5 parts, which are Demographic, Price, Convenience, Life Style and Nutrition. In addition, scale technique that we use is Likert scale. So, in the part of price, convenience, attitude and nutrition, we can get their response of perception of the higher level educations students in fast food view. While before the 5 part that previous mention, we also set questions to get some basic information about students perception on fast food consumption. For examples, which fast food restaurant are students most to consume. Where or location Fast food restaurants that around the higher education institution It can give us great chances to gather our survey from our target respondents which are students of high education institution. Besides the reason, it will give us more or accurate feeling from students to answer to the survey, such as Seri Kembangan Mc-Donald, Cyberjaya Domino Pizza. Online Survey Nowadays, all the students form higher education institution are online, no matter is their academic purpose, for fun or else they also spend a lots of time in online. So, through online survey, we can collect survey faster and easy. Reason of us to run 2 ways of survey is that we can gather different data or view of respondents when they are not from the same type of groups. For example, online respondents that do not consume much may have different view such as perception of price is higher compare with respondents which direct fulfill in the fast food restaurants. Time or period Most of the fast food restaurants are also have provide different package in different time or period, so we will separate 3 groups which are breakfast, lunch and dinner time slots to gather our survey, or it can also name as stratified sampling. Although online method can be collect data faster, but we also need to use 1 month to leave at online, so that can gather more responses. Our 2 methods will be run together so that can gather survey in the faster way. Questionnaire [1]Gender : Male Female [2]Age : à ¢Ã¢â‚¬ °Ã‚ ¤ 20 21 27 28 34 35 41 42 48 49 55 [3] Race : Malay Chinese Indian Others [4] Course : (Ex: BBA Marketing with Multimedia) [5] Year of Study: (1, 2, 3, 4, first, second, third, fourth or others) [6] Where do you live currently? (Sri Kembangan, Cyberia or others) [7] Income Level or Pocket Money:- RM2001.00 RM3000 .00 RM3001.00 RM4000.00 > RM4000.00 [8] Which fast food restaurant(s) you most consume? (May choose more than 1) KFC MC-Donald Burger King Pizza Hut AW Others: [9] I choose fast food because à ¢Ã¢â€š ¬Ã‚ ¦ (May choose more than 1) No Choice Delicious Easy to go Fast to get meal Others: [10] I frequently select fast foods _______________as my meal set. (May choose more than 1) Breakfast Lunch Tea time Dinner Supper Others [11] I choose fast food, when I am _____? Rushing of Time Very Hungry Stress Others [12] What do you think about the price rate for fast food in value meal? Strongly Inexpensive 1 2 3 4 5 Strongly Expensive [13] What do you think about the price rate for fast food in ala cart? Strongly Inexpensive 1 2 3 4 5 Strongly Expensive [14] How frequent do you add on or purchase a larger meal? Not Frequent 1 2 3 4 5 Very Frequent [15] How frequent do you redeem the voucher provided by fast food restaurant? Not Frequent 1 2 3 4 5 Very Frequent [16] Do you apply as a fast food restaurant member? Yes No If yes, do you use member card to get members privilege (such as redeem price)? Yes No If no, will you consider applying member card in the future? Yes No [17] Fast food restaurants location currently in town is best serving me. Strongly Agree 1 2 3 4 5 Strongly Disagree [18] Fast food restaurant in shopping mall save my time in choosing food. Strongly Agree 1 2 3 4 5 Strongly Disagree [19] I can easily search for fast food restaurant whenever I feel like buying fast food. Strongly Agree 1 2 3 4 5 Strongly Disagree [20] I am willing to travel to a restaurant just to eat fast food. Strongly Agree 1 2 3 4 5 Strongly Disagree [21] Fast food restaurants location would be a consideration for me to buy fast food. Strongly Agree 1 2 3 4 5 Strongly Disagree [22] I will visit fast food restaurant more often if the fast food restaurant located nearby my house. Strongly Agree 1 2 3 4 5 Strongly Disagree [23] I often use Drive-Thru service provided by the fast food restaurants when I am in a rush. Strongly Agree 1 2 3 4 5 Strongly Disagree [24] Drive-Thru service provided by the fast food restaurants save my time in ordering fast food. Strongly Agree 1 2 3 4 5 Strongly Disagree [25] I often use delivery service provided by the fast food restaurants. Strongly Agree 1 2 3 4 5 Strongly Disagree [26] Delivery service provided by the fast food restaurants save my time in ordering fast food. Strongly Agree 1 2 3 4 5 Strongly Disagree [27] Delivery service provided by the fast food restaurants delivered my order within the time period that they have promised. Strongly Agree 1 2 3 4 5 Strongly Disagree [28] Counter service in fast food restaurant very fast in the speed in serving my order. Strongly Agree 1 2 3 4 5 Strongly Disagree [29] Counter service in fast food restaurant is efficiently serving my order. Strongly Agree 1 2 3 4 5 Strongly Disagree [30] I will visit fast food restaurant more often if the fast food restaurant serve my order in a shorter time. Strongly Agree 1 2 3 4 5 Strongly Disagree [31] I like the concept where fast food restaurant open 24 hours a day. Strongly Agree 1 2 3 4 5 Strongly Disagree [32] Do you know the nutrition contains in the fast food? Yes No [32] How do you know about the nutrition of fast food? Word of mouth Parents Education News paper [33] Are you alert about nutrition the value of fast food? Not alert 1 2 3 4 5 strongly alert [34] Would you still consider consuming particular fast food, after referring to Nutrition Value Label? Not consuming 1 2 3 4 5 strongly consuming [35] Do you think fast food nowadays is nutrition? Yes No [36] How often do you visit the fast food restaurant in a week? Every day 3 times 2 times Never. [37] Do you agree on going to a fast food restaurant for a supper? Yes No [38] The most suitable place to organize a group gathering isà ¢Ã¢â€š ¬Ã‚ ¦, Pub Fast food restaurant At home Others __________ [39] Do you think Wi-Fi is important to be implemented in a fast food restaurant? (Please state your reasons below.) Yes No __________________________________________________________________________________________________________________________________________ [40] Lastly, What came across your mind, when you hear the word FAST FOOD? __________________________________________________________________________________________________________________________________________________________

Friday, October 25, 2019

Knights of the Golden Circle Essay -- American History, Bickley, Valla

In 1854, a medical practitioner of ambiguous credentials, George W. L. Bickley, founded the Knights of the Golden Circle. Headquartered in Cincinnati, Ohio, the Golden Circle was complete with passwords, quasi-Masonic rituals, secret signs and symbols. The Knights of the Golden Circle (later called the Order of the American Knights and, by February 1864, the Sons of Liberty) (Bruce Tap, Over Lincoln Shoulder, 73) quickly hatched lodges throughout Kentucky, Missouri, Iowa, Illinois, Indiana, and Ohio. To identify themselves, members wore the head of Liberty cut out from the old-style copper pennies. (Tap, 74) Affectionately, their enemies called them Copperheads, a reference to the venomous snake. Although there were many, it is arguable that the antiwar Copperheads rallied the most passionate around one leader, Clement Vallandigham. Born on July 29th, 1820 in New Lisbon, Ohio, Vallandigham was a brilliant individual, whose young mind at age two knew the alphabet, at twelve, spoke Greek and Latin, and who entered Jefferson College in Philadelphia at the age of seventeen. At nineteen, Clement Vallandigham became principle at Union Academy in Maryland, and at twenty was editor of an extremist Democratic newspaper. (Tap, 6) Later in life, Vallandigham gained the reputation in Ohio as an unbeatable, eccentric, defense attorney. After a term as governor of Ohio, Vallandigham was elected to congress with the platform of anti-Abolitionist Democrat, advocating Confederate Independence and denouncing emancipation, but was defeated in 1862. (Chandra Manning, What This Cruel War Was Over, 99) In his last speech before Congress, Vallandigham urged his countrymen to stop fighting. (Roger L. Ranson, The Confederate States of America: What Mi... ...nited States. (Ranson, 160) Lincoln’s reputation however won by over 400,000 popular votes and easily confirmed an electoral majority. Several states now allowed their soldier citizens to cast a ballot, a first in United States history. Soldiers in the army gave Lincoln over than 70% of their votes. (Manning, 148) Meanwhile, as the list of dead and wounded hit northern newspapers, Vallandigham returned from Canadian exile to attend a convention condemning this â€Å"unnecessary war† and adopting resolutions in favor of an â€Å"immediate cessation of hostilities† and a negotiated peace. (Manning, 149) Once again up to his old tricks, Vallandigham would later disguise himself by stuffing a pillow under his shirt and donning a false mustache just in time to denounce Lincoln publically in the 1864 presidential election, where at which Lincoln will ignore him. (Dickson, 316) Knights of the Golden Circle Essay -- American History, Bickley, Valla In 1854, a medical practitioner of ambiguous credentials, George W. L. Bickley, founded the Knights of the Golden Circle. Headquartered in Cincinnati, Ohio, the Golden Circle was complete with passwords, quasi-Masonic rituals, secret signs and symbols. The Knights of the Golden Circle (later called the Order of the American Knights and, by February 1864, the Sons of Liberty) (Bruce Tap, Over Lincoln Shoulder, 73) quickly hatched lodges throughout Kentucky, Missouri, Iowa, Illinois, Indiana, and Ohio. To identify themselves, members wore the head of Liberty cut out from the old-style copper pennies. (Tap, 74) Affectionately, their enemies called them Copperheads, a reference to the venomous snake. Although there were many, it is arguable that the antiwar Copperheads rallied the most passionate around one leader, Clement Vallandigham. Born on July 29th, 1820 in New Lisbon, Ohio, Vallandigham was a brilliant individual, whose young mind at age two knew the alphabet, at twelve, spoke Greek and Latin, and who entered Jefferson College in Philadelphia at the age of seventeen. At nineteen, Clement Vallandigham became principle at Union Academy in Maryland, and at twenty was editor of an extremist Democratic newspaper. (Tap, 6) Later in life, Vallandigham gained the reputation in Ohio as an unbeatable, eccentric, defense attorney. After a term as governor of Ohio, Vallandigham was elected to congress with the platform of anti-Abolitionist Democrat, advocating Confederate Independence and denouncing emancipation, but was defeated in 1862. (Chandra Manning, What This Cruel War Was Over, 99) In his last speech before Congress, Vallandigham urged his countrymen to stop fighting. (Roger L. Ranson, The Confederate States of America: What Mi... ...nited States. (Ranson, 160) Lincoln’s reputation however won by over 400,000 popular votes and easily confirmed an electoral majority. Several states now allowed their soldier citizens to cast a ballot, a first in United States history. Soldiers in the army gave Lincoln over than 70% of their votes. (Manning, 148) Meanwhile, as the list of dead and wounded hit northern newspapers, Vallandigham returned from Canadian exile to attend a convention condemning this â€Å"unnecessary war† and adopting resolutions in favor of an â€Å"immediate cessation of hostilities† and a negotiated peace. (Manning, 149) Once again up to his old tricks, Vallandigham would later disguise himself by stuffing a pillow under his shirt and donning a false mustache just in time to denounce Lincoln publically in the 1864 presidential election, where at which Lincoln will ignore him. (Dickson, 316)

Thursday, October 24, 2019

Health and Safety Project Essay

This work-based project forms an important part of your training. The aim of this project is to familiarise yourself with your working environment and the Health and Safety issues that arise in your placement. On completion you should: Understand the structure your organisation’s; and your role in it Understand the importance of Health and Safety at work Understand the legal requirements of Health and Safety at work Know your organization’s health, hygiene and accident procedures To complete this assignment you may need to make notes in before filling in the information. Take your time and carefully answer every question as fully as possible; the more you write the more criteria you will meet. If you need any help please speak to your workplace supervisor, your colleagues, your College tutor or your Training Co-ordinator. Describe your placement, e.g. busy town/country, client group (age, culture, special needs): The site that Oakland’s is situated on was once the site of the old Parcroft Juniors School, which was torn down and rebuilt with the merger of the Westfield Infant’s. The newly reformed school was named after the old oak tree, which still stands on the grounds of the school and has done for 300 years. So it was only fitting that the school was named Oakland’s, and when you talk to past pupils who attended Parcroft, they always fondly remember playing marbles or chase under the oak trees branches. Oakland’s Primary School is based within the busy town of Yeovil and is situated between Preston Grove, Linden Road and Summerleaze Park. It is a modern High Tec school with all the modern facilities you would expect. The school was built on one level giving easy access to all able bodied and  unable bodied pupils alike to attend the school. The building is quiet self efficient and generates its own electric with solar panels, has under floor heating to heat the school throughout and even the lights run on sensors to turn on and off when you enter and exit a room. Each classroom is fitted with large touch screen boards, which the teachers can run from their laptops giving them a huge range of access to a wide range of teaching resources, enhancing the pupils learning to the up most and keeping them interactive with their learning. Roughly 420 pupils attend the school, ranging from the ages of 4 years up to 11 years old. The school uniform is a purple jumper with the school emblem of an Oak Tree, white sweatshirts, grey trousers or skirts and black shoes. Each of the 14 classes within the school has been named after an animal, giving each class its own identity, including a mascot. There is also four teams throughout the school, which is used within each classroom and the children are encourage to win team points for their team so that at the end of the school year their team can win the team cup. This helps with the pupils taking pride in their achievements and to try hard to earn a point. There are many facilities within the school and on the surrounding grounds of the school, these include: The I.C.T suite where the children learn how to use computers, from word processing to using the internet safely. The school hall which is used for weekly assemblies, indoor sports activities, and even the Christmas nativity plays. The music room which is full of many different musical instruments, letting the pupils express themselves and learn about music. The fully equipped cookery room were the pupils learn about healthy eating and different foods from around the world. This is also where the breakfast club is held every morning. Then there is Forest school which is held in a purpose built log cabin surrounded by trees and a wildlife garden. This is where pupils go for environmental studies, to learn about insects, plants, animals and the environment. The Outdoor facilities include several outside learning areas that are used throughout the day depending on weather. There are also extensive fields, several play areas and two activity play areas. Oakland’s Primary also offers a large range of activities and clubs after school, which range from performance arts, music, sports, computer clubs and gardening clubs. There is also a holiday care  scheme which offers families affordable, childcare. Within Oakland’s there is also an Autism Base which is known as Peacocks Class. This based within it’s own sector of the school’s main building and is solely run by the council and has its own staff. The base consists of two teaching areas, two sensory rooms, a kitchen, a toilet and its own outside area. Non-Statutory requirements (in your workplace) What is the ratio of adults to children? In Foundation and Key Stage One the ratio of adults to children is 1 to 10 In Key Stage Two the ratio of adults to children is 1 to 15 Are the ratios different in any other room at work; if yes please give details? Yes in the Autism base the ratio of adult to children is different. Statutory requirements What are the statutory requirements regarding adult: child ratios? The EYFS states that the adult to child ratio within classes with children over the age of three should be 1 Adult to 13 Children. But must be a qualified teacher, or hold a relevant level 6 qualification. It also states that there should also be at least one other member of staff within the classroom that holds a level 3 qualification. However if the teacher is absent from the classroom then the ratio requirements change and it is recommended that it should be 1 Adult to 8 Children. But must hold a level qualification and the other staff within the classroom should hold a level 2 qualification. On school trips the ratios change again dependent on the type of trip. Also these can change when dependant on certain circumstances and other factors, which could Include if any of the pupils have special educational needs or medical needs. It can also be altered depending on the experience and competence of the staff attending the trip, including the number of first aiders going along. It is recommended that the ratios should follow: 1:6 for years 1 to 3, 1:10 for years 4 to 6, and 1: 15 / 20 for years 7 upwards. Why are these necessary? To make sure that the children are being educated and taken care of correctly and are under the supervision of qualified staff members. What are the statutory requirements regarding space? Class sizes: Schools must make sure that children aged between 5 years and 7 years aren’t taught in classes of more than 30 pupils. There is no legal limit for pupils aged 8 years and over. Why is this necessary? So that schools do not have oversized classes, as then the children do not get the attention they need to learn. Organisation and Structure of the Workplace Every organisation or business has its own basic structure of management. Each manager is responsible for those in their department. The structure can be set out like a pyramid. Responsibilities may differ. Please identify all staff roles and responsibilities; highlighting your own: Governors They school governors are responsible for working with the school to ensure that it delivers a good quality education. Head Teacher Has overall responsibility for the school, its staff, its pupils and the education they receive. Deputy Head Teacher Plays a major role in managing the school, particularly in the absence of the head teacher. Is also responsible for a curriculum area and specific areas of the school management, delegated to them by the Head Teacher. Inclusion Leader The special educational needs coordinator is responsible for day to day provisions for pupils with special educational needs. NQT Mentor They are responsible for the Newly Qualified Teachers, and are there to give support and guidance when needed. Foundation Stage Leader Responsible for children in foundation stage, leading the foundation team of teachers and teaching assistants. KS1 Leader To manage Key Stage 1 team of teachers and teaching assistants. KS2 Leader To manage Key Stage 2 team of teachers and teaching assistants. Phase Leaders Responsible for co-ordinating and motivating staff and children in their allocated phase to ensure high levels of achievement. Teachers Are responsible to plan, prepare and lessons to meet the needs of all their pupils in their care. Setting and marking work and recording pupil’s development as necessary. But also within Oakland’s each teacher is responsible for an area of the curriculum, such as; A curriculum coordinator for Numeracy, which makes them responsible for the leadership and management of the subject. Teaching Assistants To assist the classroom teacher to prepare for lessons such as resources that are required, or to put out equipment at the start of the lesson. To support the teacher in the day to day running of the classroom from up keeping data files, cataloguing resources, maintaining inventories, and photocopying. Undertaking learning activities with a small group of children, who may need extra support. Lunchtime Supervisors They look after the children during lunchtime breaks, so that most of the staff members are able to take their breaks. They take the children who have school dinners to the schools canteen, they also look after the pupils who bring pack lunch. Within one of their classroom or outside weather permitting. They are also first aid trained and look after the children whilst playing outside. Administration Staff There is a wide range of job roles within this department of the school, ranging from: First point of contact for the school either by telephone, email or face to face. Diary management for the Head teacher or departmental leaders Issue visitor passes where necessary and maintain signing in and out books Maintain data bases and filing systems Prepare correspondence and collect fees To contact parent/guardians for specific reasons when requested by staff and to request for collection of sick children on behalf of the staff. And many more jobs besides Site Staff Maintain the school, deal with cleaning, maintenance of equipment and the school building. Catering Staff Cater for the pupils and staff that eat within the canteen, with healthy food within their budget. Volunteers Helping within the school, with assisting the classroom teacher with tasks such as listening to pupils read, taking part on school trips and helping out at school fairs. List the things you have agreed with your employer that you are prohibited from doing: Entering the Autism base, Administering first aid to a pupil this must be done by a qualified first aider. What breaks are you entitled to? When working a full day within the school – from 8.45am to 3pm I am entitled to an hour for lunch. Though on occasions I may be required to cover a lunchtime supervisor duty, which then I will be allocated an hour within the afternoon. This is the same for break times, we are entitled to take the break ourselves or we may be asked to supervise. If you are unhappy with a health & safety issues what would you do? I would have to report this to the site service manager or to the deputy head teacher Risk Assessments Has your placement got a risk assessment policy? Yes – Every school and workplace must have a risk assessment policy. Where is it kept? Within the Administration Office Who has access to it? The HSE, The Governors, The Head Teacher, staff members and parents How often are they reviewed and why is this necessary? It is reviewed on a yearly basis unless any changes have to be implemented within the school. Then the risk assessment will be reviewed as a part of the process. Such as recently the school has had some staff members trained in manual lifting and so the risk assessment has to be updated for this new procedure within the school. Give an example of a risk assessment you have done and why? When reading with the foundation children one to one they have a tendency to swing on their chair. This has risks of the chair flipping backwards and the child following which in turn could cause harm to themselves. So I have had to ask them to sit properly and not to swing on their chair. Identify and list below 4 possible risks/hazards that might occur within your work placement and state how you would prevent each one?, explain how they will be monitored and reviewed 1. Pupils trapping fingers in the internal fire doors. The fire doors are extremely heavy to open to exit the classrooms or to enter the bathroom, especially for the less able bodied and the smaller children within foundation. These doors are on hinges and close back on themselves when opened. Are very heavy as they are designed to protect against fire. However I have witnessed children struggling with these doors. When trying to open these doors by themselves they tend to place one hand on the door frame as they use the other hand to open the door. If they where to lose grip of the door it would swing back and the likely hood of trapping their fingers is a high risk. The less able bodies students struggle even more so and they normally have a buddy within their classroom to open these doors for them. Which in turn takes away their independence, and they normally have a fear of getting stuck in the toilet or in room as they are unable to open these doors by themselves. I would look into adapting the doors by placing an electronic button system. Where the smaller children and the less able bodied children will be able to press a button and the door will automatically open for them. As it is impossible to loosen the hinges on the door as they will no longer work as intended. If this is not possible when a child needs to exit a room then an adult should always be present to assist. Preventing any accidents from happening, or a fear of getting stuck. 2. Tripping over chair leg in classroom When children are moving around the classroom it is often an possibility that they could trip over a chair leg. Either from the chair not being placed under a table properly or whilst another child is swinging on their chair. This could be very hazardous as they could fall and hit a side of a table or land badly on the ground. Add no swinging on your chair and to tuck away chairs properly when not being used onto the classroom rules. I would remind any of the children I see not tucking their chair away to do so, and at the end of class make a check that all chairs are tucked away correctly. I would also do the same with children swinging on their chair; I would ask them not to, and remind them of the class room rules. 3. Slipping on wet floors in the toilets Before break times and lunch times the children are all asked to go to the toilets and wash their hands. The children have a tendency to drip a large amount of water across the floor when walking over to the hand dryer. Which when you have approximately 30 children at once using the toilets the water can accumulate into a puddle of water, which becomes a slipping hazard. Allowing only ten children to use the toilets at a time to wash their hands. So that a teaching assistant could maintain the floor with a mop preventing puddles forming, then let the next ten children in once the teaching assistant has vacated. Another option could be before allowing the children  out of the class to use the toilet the teacher could remind them to shake the excess water off their hands over the sink before drying their hands. However the procedure they have set in the foundation classes works well where they set up two washing up bowls set within the classroom on tables. The children wash their hands under adult supervision and then dry their hands on towels. Makes it less children rushing through the toilets just to wash their hands. 4. Getting caught up and Tripping over Play bibs Within foundation the children are allowed out to play within the soft play area during lessons, but only in a group of five. To keep the group to only five children at a time there are five play bibs supplied which they have to wear whilst outside. However when a child wants to come back inside they have to take off the play bib, which then leaves a bib spare for another child to go out. It works in principle, and keeps the group to only five children at a time. However the children do not maintain putting the bibs back within the box after they are finished and they tend to just throw the play bibs down on the ground. This then becomes a tripping hazard and another child or member of staff could get their feet caught up within the bib and fall over, causing an injury. A box placed outside seems to be over looked by the children, so I would suggest placing a coat hook within the classroom, at their level by the door that they exit and enter to play outside. Then reaffirm that the play bibs must be hung up when not being used and remind the children when they drop the bib to hang it up or no play for them for the rest of the day. Offsite Safety What risk assessments do you need to complete before going of site/ on an outing? Oakland’s Primary employs an external Risk Assessment company, to carry out the risk assessments on behave of the school. They attend the site of the visit and make an assessment of the risks that may apply and forward the report back to the Head Teacher or Deputy Head Teacher. The report will be compiled of recommendations based on factors of the trip, and any control measures and contingencies that need to be set in place relating to the risks that could occur. From the report the school will then set in place the criteria based around the risks, such as: The age / competence / fitness / usual standard of behaviour of the pupils Any special educational / medical needs of the pupils Adult to Child ratios The competence / experience / qualifications of the adults Modes of transport, journey routes and location of the visit The correct attire that may need to be required depended on weather conditions and location of visit. Any emergency procedures When there is a less able bodied pupil attending the trip, the leading teacher will take a visit to the site themselves to evaluate the location and the facilities. This is so they can make sure that no child will miss out. They also take a visit to plan activities accordingly and to talk to any personnel that may work within the location of the visit, and to set out a timetable of the activities. Are the adult: child ratio’s different? Yes the ratios are different, and these depend on the location of the visit. What are your roles and responsibilities? I have done quite a few school trips, some have been to support my son during a school visit and have travelled either via the school mini bus or and in one instance myself and my son travelled by our own means of transport. When arriving at school we are given the activities schedule and what groups we will be in and the names of the children under our care. We check that all the children have brought everything they need, if not the school does try to provide anything that a child has forgotten or does not own, such a wellingtons, spare clothes etc. We run through the plan before leaving the classroom. On the mini bus I would support my son, during the journey and help the other two teaching assistants within the mini bus to keep the rest of the children entertained. We normally share out books, maths tasks or we will start some singing. Once we have arrived at the location I am put in charge of a small group of 4 to 5 children which includes my son and I follow one of the leading teachers during the activities. The last school trip to kingcombe meadows we went hunting within the meadows for wild flowers with a check list, we also caught bugs within nets and did some fishing in the river. I had a small group of 5 children under my care and I helped them with their activities, encouraging them to figure out what bug the found or flower. I have also helped with a foundation school outing, this was up to the post box outside of the school gate and up the road to post their letters home, as part of their Post Office activities in class. I handed out high-viz vests to every child before we left and was put in charge of three children as we walked in a line up and back to the post box.

Wednesday, October 23, 2019

Introduction of Information Security Systems Cis4385

1. Which if the following IPv6 address type is assigned to multiple interfaces but packets will only be delivered to one? a. Multicast b. Anycast c. Unicast d. Broadcast Grade:1 User Responses:b. Anycast Feedback:a. An anycast address is assigned to a group of interfaces on multiple nodes. Packets are delivered to the â€Å"first† interface only. 2. Routers operate at which OSI layer? a. Physical b. Transport c. Network d. Session Grade:1 User Responses:c. Network Feedback:a. Routers operate at the network layer making routing decisions based on IP addresses. 3. Which of the following is NOT a private IPv4 address? Choose all that apply. a. 192. 168. 5. 60 b. 172. 25. 6. 4 c. 10. 0. 6. 5 d. 26. 68. 6. 1 Grade:1 User Responses:d. 26. 68. 6. 1 Feedback:a. The private IP address ranges are as follows. IP Class Assigned Range Class A 10. 0. 0. 0-10. 255. 255. 255 Class B 172. 16. 0. 0-172. 31. 255. 255 Class C 192. 168. 0. 0-192. 168. 255. 2554. What is a server that evaluates Internet requests from LAN devices against a set called? a. Proxy b. Firewall c. Load balancer d. NAT server Grade:1 User Responses:a. Proxy Feedback:a. A server that evaluates Internet requests from LAN devices against a set of rules is called a proxy server. NAT servers perform private to public address translation; load balancers manage traffic between cluster hosts; and a firewall filters traffic based on access control lists.5. Which type of device maintains awareness of the status of connections, thereby preventing IP spoofing attacks? a. Stateless packet filterin g firewall b. Stateful packet filtering firewall c. NAT filter d. Application-level gateway Grade:1 User Responses:b. Stateful packet filtering firewall Feedback:a. A stateful packet filtering firewall is one that monitors the state of each connection by examining the header of each packet. Read this  Chapter 2 – Why Security is Needed A stateless packet filtering firewall does not do this. NAT filters perform only private-to-public address translation. An application-level gateway provides protection to a specific application such as FTP.6. Which of the following firewall services works at the session layer of the OSI model? a. Application layer gateway b. Stateful filtering c. NAT d. Circuit-level gateway Grade:0 User Responses:c. NAT Feedback:a. Circuit-level gateways work at the Session Layer of the OSI model and apply security mechanisms when a TCP or UDP connection is established; they act as a go between for the Transport and Application Layers in TCP/IP.After the connection has been made, packets can flow between the hosts without further checking. Circuit-level gateways hide information about the private network, but they do not filter individual packets.7. Which of the following are the two main functions of a proxy server? a. Caching of web pages b. NAT c. Domain authentication d. DHCP Grade:1 User Respo nses:a. Caching of web pages,c. Domain authentication Feedback:a. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time. b. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time.8. Which of the following devices can detect but not prevent attacks across the entire network? a. NIDS b. Host-based IDS c. NIPS d. Protocol Analyzer Grade:1 User Responses:a. NIDS Feedback:a. Network Intrusion Detection Systems (NIDS) detect but do not prevent attacks across the entire network. Host-based IDS can protect only the host on which it is installed. Network Intrusion Protection Systems (NIPS) can detect and prevent attacks across the entire network. A Protocol Analyzer ca n capture traffic but not act upon it.9. When a NIPs blocks legitimate traffic, what is it known as? a. False negative b. True negative c. False positive d. True positive Grade:1 User Responses:c. False positive Feedback:a. A blocking of traffic is a positive action, and when it is in response to legitimate traffic, it is considered a false action; thus it is a false positive. A false negative would be when an action is NOT taken on traffic that is not legitimate. The other two options are normal actions; a true negative is the allowing of legitimate traffic, whereas a true positive is the blocking of illegitimate traffic.10. Which of the following types of NIPS reacts to actions that deviate from a baseline? a. Signature-based b. Heuristic c. Anomaly-based d. Bit blocker Grade:1 User Responses:c. Anomaly-based Feedback:a. Anomaly-based NIPS recognizes traffic that is unusual and reports it. Signature-based NIPs are configured with the signatures of attacks. Heuristics looks for pat terns in the traffic, whereas bit blocker is a not a type of NIPs.11. Which of the following systems attempt to stop the leakage of confidential data, often concentrating on communications? a. DHCP b. DNS c. DLP d. STP Grade:1 User Responses:c. DLP Feedback:a. Data loss prevention (DLP) systems are designed to protect data by way of content inspection. They are meant to stop the leakage of confidential data, often concentrating on communications. As such, they are often also referred to as data leak prevention (DLP) devices, information leak prevention (ILP) devices, and extrusion prevention systems.Regardless, they are intended to be used to keep data from leaking past a computer system or network and into unwanted hands.12. When a company buys fire insurance they are ____________ risk. a. accepting b. avoiding c. transferring d. reducing Grade:1 User Responses:c. transferring Feedback:a. It is possible to transfer some risk to a third-party. An example of risk transference (also k nown as risk sharing) would be an organization that purchases insurance for a group of servers in a datacenter.The organization still takes on the risk of losing data in the case of server failure, theft, and disaster, but transfers the risk of losing the money those servers are worth in the case they are lost.13. Which of the following processes block external files that use JavaScript or images from loading into the browser? a. URL filtering b. Content filtering c. Malware inspection d. Blacklists Grade:1 User Responses:b. Content filtering Feedback:a. Content filtering is a process that blocks external files that use JavaScript or images from loading into the browser. URL filtering blocks pages based on the URL.Malware inspection looks for malware based on a signature file, and blacklists are items to be denied by spam filters.14. Which of the following actions should NOT be taken for the default account on a network device? a. Delete it. b. Change the password. c. Disable it. d. Leave it as is. Grade:1 User Responses:d. Leave it as is. Feedback:a. The default account has a well-known username and password, so it should be either deleted or disabled, or at a minimum its password should be changed.15. Firewall rules are typically based in all but which of the following? a. IP addresses b. MAC addresses c. Port numbers . Content type Grade:1 User Responses:d. Content type Feedback:a. Firewall rules are typically based on IP addresses, MAC addresses, or port numbers, but they cannot filter for content.16. Which of the following is the target of a double tagging attack? a. VPNs b. VLANs c. Collision domains d. DMZs Grade:1 User Responses:b. VLANs Feedback:a. A double tagging attack can enable the attacker to view traffic from multiple VLANs.17. A network created to allow access to resources from the Internet, while maintaining separation from the internal network is called a ______? a. VPN b. VLAN c. Honeypot d. DMZ Grade:1User Responses:d. DMZ Feedback:a. When talking about computer security, a Demilitarized Zone (DMZ) is a special area of the network (sometimes referred to as a subnetwork) that houses servers which host information accessed by clients or other networks on the Internet, but which does not allow access to the internal network.18. How can access to the remote management of a router be protected? a. Content filtering b. ACLs c. Firewalls d. IPS Grade:0 User Responses:c. Firewalls Feedback:a. Remote access to a router is usually done via Telnet or SSH. The port used (vty line) can be secured using an access control list. The other options can all be used to help protect routers but not access the remote management function.19. You need to allow access from your network to all web sites. What port numbers should be opened in the firewall? Choose all that apply. a. 25 b. 443 c. 80 d. 119 e. 22 f. 23 Grade:1 User Responses:c. 80 Feedback:a. HTTP and HTTPS are the two services you need to allow access to use ports 80 and 443 res pectively.20. Which of the following mitigation techniques can prevent MAC flooding? a. Secure VLANs b. Prevent ICMP responses c. 802. 1x d. 802. 1q Grade:1 User Responses:c. 802. 1x Feedback:a.MAC flooding, which involves overwhelming the memory of the switch with MAC frames sourced from different MAC addresses, can be prevented by requiring authentication on each port through 802. 1x. Secure VLANs cannot prevent this because the frames don’t need to enter a VLAN to cause the problem. ICMP is at Layer 3, these frames are at Layer 2, and 802. 1q is a VLAN tagging protocol that does not prevent frames from entering the switch through access ports.21. Which of the following attacks cannot be mitigated with a flood guard? a. Smurf attack b. Fraggle c. Teardrop attack d. Session theft Grade:1 User Responses:d.Session theft Feedback:a. The smurf, fraggle, and teardrop attacks all involve sending a flood of packets to a device, using different types of malformed packets. A session theft attack is when a session cookie is stolen and used to authenticate to a server.22. Loop protection is designed to address problems that occur with which device? a. Switch b. Hub c. Router d. Firewall Grade:0 User Responses:b. Hub Feedback:a. Loops occur when switches have redundant connections causing a loop. Loop guard (or loop protection) can prevent loops on the switch.23. When creating an ACL which of the following statements is NOT true? a.The order of the rules is important for proper functioning b. You must include a deny all statement at the end of the rule set for proper functioning c. The more specific rules should be placed at the beginning of the rule list d. Once created, the ACL must be applied to an interface Grade:1 User Responses:b. You must include a deny all statement at the end of the rule set for proper functioning Feedback:a. There is an implied deny all statement at the end of each ACL and it is not required to include one.24. Which of the following is a n example of insecure network bridging in a LAN? a. Laptop connected to a hotspot and an ad hoc network . Laptop connected to a wireless network and the wired LAN at the same time c. Router connected to two subnets d. PC connected with two NIC to the same LAN Grade:1 User Responses:b. Laptop connected to a wireless network and the wired LAN at the same time Feedback:a. When a laptop connects to a wireless network and the wired LAN at the same time, it can create a bridge between the two allowing access to the LAN. The other scenarios do not create a security problem for the LAN.25. When the administrator creates a rule on the firewall to prevent FTP traffic, this is a type of __________rule. . implicit deny b. implicit allow c. explicit deny d. explicit allow Grade:1 User Responses:c. explicit deny Feedback:a. When traffic is specified to be prevented, it is an explicit deny. When it is denied simply because it was not specifically allowed, that is an implicit deny.26. Network Acces s Control (NAC) is an example of_______________. a. role-based management b. rules-based management c. port-based access d. application layer filtering Grade:1 User Responses:b. rules-based management Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed.Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so on—effectively weeding out those who would perpetuate malicious attacks.27. What type of device is required for communication between VLANs? a. Hub b. Switch c. Router d. Firewall Grade:1 User Responses:c. Router Feedback:a. Hosts in different VLANs are also in different subnets and routing must be performed for them to communicate.28. Which of the following would be least likely to be placed in the DMZ? a. Web server b. DNS server c. Domain controller d. FTP serverGrade:1 User Responses:c. Domain controller Feedback:a. All th e options except a domain controller are often placed in the DMZ so they are accessible to the outside world. A DC however is sensitive and should NOT be placed in the DMZ.29. Subnetting a network creates segmentation at which layer of the OSI model? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4 Grade:1 User Responses:c. Layer 3 Feedback:a. Subnetting a network creates segmentation using IP addresses, which is Layer 3.30. What service is required to represent multiple private IP addresses with a single public IP address? a. NAT b. DHCP c. DNS d. DLP Grade:0User Responses:a. NAT Feedback:a. Network Address Translation (NAT) is required to represent multiple private IP addresses with a single public IP address. The specific form of NAT required to represent multiple private IP addresses with a single public IP address is called Port Address Translation (PAT).31. Which of the following is NOT a remote access protocol? a. MS-CHAP b. CHAP c. LDAP d. PAP Grade:1 User Responses:c. LDAP Feedb ack:a. Lightweight Directory Access Protocol is used for accessing directory services such as Active Directory. It is not used in remote access. All other options are remote access protocols.32. Which of the following devices are susceptible to war dialing? a. Modems b. Firewalls c. Content filters d. Load balancers Grade:0 User Responses:a. Modems Feedback:a. Any devices that accept phone calls such as modems or PBX systems with remote phone access are susceptible to war dialing.33. When computers are not allowed to connect to the network without proper security patches and virus updates, the network is using a form of _____________. a. PAT b. DAC c. NAC d. DMZ Grade:0 User Responses:d. DMZ Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed.Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so on—effectively weeding out those who would perpetuate malicious attacks.34. Which of the following items do not need to be changed on a new router to ensure secure router management? a. IP address b. Administrator name c. Administrator password d. IOS version Grade:1 User Responses:d. IOS version Feedback:a. All the options except the IOS version can be set to defaults from the factory and should be changed because they are well known.35. Which of the following is NOT an example of cloud computing? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1 User Responses:d. BaaS Feedback:a. Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) are all forms of cloud computing.36. On which concept is cloud computing based? a. load balancing b. virtualization c. RAID d. DLP Grade:1 User Responses:b. virtualization Feedback:a. All forms of cloud computing use virtualization.37. A three legged perimeter is a form of ______________. a. VPN b. DMZ c. NAT d. ACL Grade:1 User Responses:b. DMZ Fee dback:a. A three-legged perimeter is a firewall or server with three NICs: one pointed to the LAN, one to the Internet, and one to the DMZ.38. Which of the following is NOT a benefit provided by subnetting? a. It increases security by compartmentalizing the network. b. It is a more efficient use of IP address space. c. It reduces broadcast traffic and collisions. d. It eases administration of the network. Grade:1 User Responses:d. It eases administration of the network. Feedback:a. Subnetting provides a number of benefits but easing administration is not one of them.39. Which of the following is the result of implementing VLANs? . Larger broadcast domains b. Smaller collision domains c. Smaller broadcast domains d. Larger collision domains Grade:1 User Responses:c. Smaller broadcast domains Feedback:a. VLANs break up the network into subnets and as such result in smaller broadcast domains.40. Which of the following services helps conserve public IP addresses? a. NAT b. DHCP c. DNS d . SLIP Grade:0 User Responses:c. DNS Feedback:a. By allowing the use of private IP addresses inside each network and by representing those groups of private IP addresses with a single public IP address, public IP addresses are conserved by NAT.41. Which of the following remote access protocols are used with VPNs? Choose all that apply. a. PPTP b. PPP c. L2TP d. SLIP Grade:1 User Responses:c. L2TP,d. SLIP Feedback:a. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up. /b. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up.42. Which of the following security protocols operates at the network layer of the OSI model? a. IPSec b. SSH c. SSL d. TLS Grade:1 User Responses:a. IPSec Feedback:a.One of the key features of IPSec is its operation at the network layer enabling it to protect any type of communication operating at th e upper layers of the OSI model.43. Which of the following are components of SNMP? Choose all that apply. a. NMS b. IPSec c. Agent d. CARP Grade:1 User Responses:b. IPSec,c. Agent Feedback:a. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates. /b. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates.44. SSL is designed as a secure replacement for which of the following? a. PPP b. Telnet c. TLS d. SSH Grade:0 User Responses:d. SSH Feedback:a. SSL is designed as a secure replacement for Telnet, which transmits in clear text.45. Which of the following protocols supersedes SSL? a. SSH b. TLS c. S/MIME d. EAP Grade:0 User Responses:a. SSH Feedback:a. TLS 1. 2, the latest version, is used when establishing an HTTPS connection and supersedes SSLv3.46. The operation of which of the following protocols makes the SY N flood attack possible? a. IPX/SPX b. AppleTalk c. TCP/IP d. RIP Grade:1 User Responses:c. TCP/IP Feedback:a.TCP/IP uses a three-way handshake for its connection, and the SYN flood attack attempts to take advantage of the operation of this connection operation.47. Which of the following provides secure web access? a. SFTP b. HTTP c. HTTPS d. SSH Grade:1 User Responses:c. HTTPS Feedback:a. HTTPS uses port 443 and is the standard for secure web access.48. SCP is a secure copy protocol that uses the port of which other protocol for transfers? a. HTTPS b. SSH c. SSL d. FTPS Grade:0 User Responses:d. FTPS Feedback:a. Secure copy (SCP) is another example of a protocol that uses another protocol (and its corresponding port). It uses SSH and ultimately uses port 22 to transfer data.49. Which of the following protocols is abused when a ping flood occurs? a. SNMP b. IGMP c. ICMP d. EIGRP Grade:0 User Responses:a. SNMP Feedback:a. Ping floods use ICMP echo request packets aimed at the target. 50. Which of the following security mechanisms are built into IPv6? a. IPSec b. SSL c. HTTPS d. EAP Grade:1 User Responses:a. IPSec Feedback:a. IPv6 has IPSec support built in.51. What method is used by SSL to obtain and validate certificates? a. SPI b. PKI c. TLS d. EAP Grade:1 User Responses:b. PKI Feedback:a.SSL and TLS use a public Key Infrastructure (PKI) to obtain and validate certificates.52. What port number does FTPS use to protect the transmission? a. 21 b. 88 c. 443 d. 445 Grade:0 User Responses:a. 21 Feedback:a. FTPS uses SSL or TLS over port 443 to make a secure connection.53. Which of the following protocols uses port 22, normally used by SSH, to make a secure connection? a. FTPS b. SCP c. SFTP d. SSL Grade:0 User Responses:b. SCP Feedback:a. Secure FTP (SFTP) uses port 22, the port for SSH, which is why it is also sometimes called SSH FTP.54. Which protocol uses ports 161 and 162? a. SMTP b. IMAP4 . SNMP d. IGMP Grade:0 User Responses:a. SMTP Feedback:a. SNMP is used to collect information about and make changes to devices on the network. It uses ports 161 and 162.55. Which protocol uses the same port as HTTPS? a. SCP b. FTPS c. SFTP d. IMAP4 Grade:0 User Responses:c. SFTP Feedback:a. FTP secure (FTPS) uses port 443, which is also used by HTTPS.56. Which protocol uses port 69? a. SCP b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:c. TFTP Feedback:a. TFTP uses port 69.57. What port number is used by Telnet? a. 80 b. 443 c. 21 d. 23 Grade:1 User Responses:d. 23 Feedback:a. Port 23 is used by Telnet.58. Which port does HTTP use? a. 80 b. 443 c. 21 d. 23 Grade:0 User Responses:b. 443 Feedback:a. HTTP uses port 80.59. Which port does SCP use to transfer data? a. 80 b. 22 c. 21 d. 23 Grade:0 User Responses:c. 21 Feedback:a. SCP uses SSH and thus port 22 to transfer data.60. Which protocol uses port 443? a. HTTPS b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:a. HTTPS Feedback:a. HTTPS uses port 443.61. Which two protocols use port 22? a. HTTPS b. FT PS c. SSH d. SCP Grade:2 User Responses:c. SSH,d. SCP Feedback:a. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port. b. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port.62. Which ports does the NetBIOS protocol uses? Choose all that apply. a. 138 b. 139 c. 137 d. 140 Grade:3 User Responses:a. 138,b. 139,c. 137 Feedback:a. The NetBIOS protocol uses ports 137 through 139. /b. The NetBIOS protocol uses ports 137 through 139. /c. The NetBIOS protocol uses ports 137 through 139.63. What protocol uses port 53? a. HTTPS b. FTPS c. SSH d. DNS Grade:0 User Responses:b. FTPS Feedback:a. DNS uses port 53.64. Which port number does RDP use? a. 3389 b. 1723 c. 1701 d. 140 Grade:1 User Responses:a. 3389 Feedback:a. Port 3389 is used for Remote Desktop (RDP).65. What protocol uses port 25? a. HTTPS b. SMTP c. SSH d. DNS Grade:1 User Responses:b. SMTP Feedback:a. SMTP uses port 25.66. Which of the following statements is true regarding WP A and WPA2? (Choose all that apply. ) a. WPA uses 256-bit encryption. b. WPA2 uses 128-bit encryption. c. WPA uses TKIP. d. WPA2 uses AES. Grade:2 User Responses:c. WPA uses TKIP. ,d. WPA2 uses AES. Feedback:a. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES. /b. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES.67. Which statement is NOT true with regard to WPA2? a. Uses AES encryption b. Meets requirements of 802. 11i c. Uses TKIP encryption d. Uses 256 bit encryption Grade:1 User Responses:c. Uses TKIP encryption Feedback:a. WPA uses TKIP but WPA2 uses AES.68. Which of the following is the security provided in the original 802. 11 standard? a. WPA b. WPA2 c. WEP d. CCMP Grade:1 User Responses:c. WEP Feedback:a. Wired Equivalent Privacy (WEP) is the security provided in the original 802. 11 standard.69. What is the authentication system that calls for a supplicant, authenticator, and authentication server called? . EAP b. WPA c. WPA2 d. WEP Grade:1 Us er Responses:a. EAP Feedback:a. Extensible Authentication Protocol (EAP) is an authentication system that calls for a supplicant, authenticator, and authentication server.70. Which of the following implementations of EAP requires certificates on the client and the server? a. EAP-FAST b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:d. EAP-TLS Feedback:a. EAP-TLS requires certificates on the client and the server.71. Which of the following versions of EAP is Cisco proprietary? a. LEAP b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:a. LEAP Feedback:a. Lightweight EAP is a version that works only on Cisco devices unless the device is from a partner that participates in the Cisco Compatible Extensions program.72. Why are MAC filters not effective in preventing access to the WLAN? a. The MAC addresses of allowed devices are contained in the beacon frames sent by the AP. b. The MAC addresses of allowed devices are contained in any frames sent by the allowed device. c. The admi nistrative effort to maintain the MAC list is prohibitive. d. If the user changes his MAC address, the filter will disallow entry. Grade:1 User Responses:b.The MAC addresses of allowed devices are contained in any frames sent by the allowed device. Feedback:a. The MAC addresses of allowed devices are contained in any frames sent by the allowed device and can be seen by those using wireless protocol analyzers. The MAC address can then be spoofed for entry.73. Which of the following frame types contain the SSID? (Choose all that apply. ) a. Beacon frames b. Data frames c. Association frames d. Authentication frames Grade:3 User Responses:b. Data frames,c. Association frames,d. Authentication frames Feedback:a. The SSID is contained in all frames.If the SSID is hidden, it is removed only from the beacon frames. /b. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /c. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames.74. TKIP was designed to correct the shortcomings of which of the following? a. EAP b. WPA c. WEP d. WPA2 Grade:1 User Responses:c. WEP Feedback:a. TKIP was designed to correct the shortcomings of WEP. It was a temporary solution for use until the 802. 1x standard was completed.75. Which of the following encryption protocols is used with WPA2? . TKIP b. CCMP c. WEP d. DES Grade:1 User Responses:b. CCMP Feedback:a. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol used with WPA2. It addresses the vulnerabilities of TKIP and meets requirements of IEEE 802. 11i.76. Which antenna types would be best for shaping the signal away from the front of the building for security purposes while still providing coverage in the other part of the building? (Choose all that apply. ) a. Yagi b. Omni c. Parabolic dish d. Semidirectional Grade:2 User Responses:a. Yagi,d. Semidirectional Feedback:a.You can us e a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario. /b. You can use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario.77. How can you keep the existing radiation pattern of the antenna while reducing the coverage area? a. Increase the power of the transmitter. b. Decrease the power of the transmitter. c. Change the polarity of the antenna. d. Remove one of the attenuators from the line. Grade:1 User Responses:b. Decrease the power of the transmitter.Feedback:a. Reducing the power level maintains the radiation pattern while making the area of radiation smaller.78. What organization created WPA? a. FCC b. Wi-Fi Alliance c. IEEE d. ISO Grade:1 User Responses:b. Wi-Fi Alliance Feedback:a. The Wi-Fi Alliance created WPA to address the weaknesses of WEP.79. To which standard is WPA2 designed to adhere? a. 802. 16 b. 802. 11f c. 802. 11i d. 802. 11e Grade:1 User Responses:c. 802. 11i Feedback:a. WPA2 is designed to adhere to the 802. 11i security standard.80. Which of the following is the weakest form of security? a. TKIP b. WPA c. WEP d. EAP Grade:1User Responses:c. WEP Feedback:a. WEP is the weakest form of security. It has been cracked and is not suitable for Enterprise WLANs.81. A ______________ attack intercepts all data between a client and a server. a. DDoS b. Man-in-the-middle c. Replay d. Smurf Grade:1 User Responses:b. Man-in-the-middle Feedback:a. Man-in-the-middle is a type of active interception. If successful, all communications now go through the MITM attacking computer.82. When a group of compromised systems attack a single target it is a called a _______________ attack. a. DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1User Responses:a. DDoS Feedback:a. A distributed denial-of-service attack occurs when a group of compromised systems launches a DDoS attack on a single target.83. When valid data transmissions are maliciously or fraudulently repeated, it is called a _______________ attack. a. DDoS b. man-in-the middle c. replay d. smurf Grade:1 User Responses:c. replay Feedback:a. When valid data transmissions are maliciously or fraudulently repeated, it is a called a replay attack.84. What attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork? a.DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1 User Responses:d. Smurf Feedback:a. A smurf attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork. The ICMP request is sent to a broadcast address. When all hosts receive the ICMP broadcast request, these host send ICMP replies to the source address, which has been set to the address of the target.85. Changing your MAC address to that of another host is called ___________________. a. spear phishing b. spoofing c. pharming d. vishing Grade:1 User Responses:b . spoofing Feedback:a.Spoofing is when an attacker tails the IP or MAC address of another computer.86. Which of the following is more an aggravation than an attack? a. Spear phishing b. Spoofing c. Spam d. Vishing Grade:1 User Responses:c. Spam Feedback:a. Spam or unwanted email is more an aggravation than an attack.87. Which of the following uses instant messaging as its vehicle? a. Spim b. Spoofing c. Phishing d. Vishing Grade:1 User Responses:a. Spim Feedback:a. Spam Over Instant Messaging (SPIM) uses IM to deliver the spam.88. When VoIP phone calls are used in the pursuit of social engineering, it is called__________. a. spim b. poofing c. phishing d. vishing Grade:1 User Responses:d. vishing Feedback:a. Vishing is phishing performed with VoIP calls, which are harder to trace than regular calls.89. What type of attack is an advanced scan that tries to get around firewalls and look for open ports? a. DDoS b. Man-in-the-middle c. Xmas attack d. Smurf Grade:1 User Responses:c. Xmas attack Feedback:a. Usually using Nmap, the Xmas attack is an advanced scan that tries to get around firewalls and look for open ports.90. __________________ is when an attacker redirects one website’s traffic to another bogus and possibly malicious website. a.DDoS b. Pharming c. Xmas attack d. Smurf Grade:1 User Responses:b. Pharming Feedback:a. Host files and vulnerable DNS software can also be victims of pharming attacks. Pharming is when an attacker redirects one website’s traffic to another bogus and possibly malicious website. Pharming can be prevented by carefully monitoring DNS configurations and host files.91. ___________ is when a person that is not normally authorized to a server manages to get administrative permissions to resources. a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:1 User Responses:d. Privilege escalation Feedback:a.Privilege escalation is when a person that is not normally authorized to a server manages to get adminis trative permissions to resources.92. Which problem is the most difficult to contend with? a. Malicious insider threat b. Fraggle attack c. Distributed denial-of-service d. Whaling Grade:1 User Responses:a. Malicious insider threat Feedback:a. Because the attacker already is inside the network with company knowledge, a malicious insider threat is the most difficult to contend with.93. What type of attack can DNS poisoning lead to? a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:0User Responses:c. Spear phishing Feedback:a. Pharming attacks lead users from a legitimate website to a malicious twin. The easiest way to do this is to poison the DNS cache so that the DNS server sends them to the malicious site.94. Strong input validation can help prevent ____________________. a. bluesnarfing b. SQL injection c. session highjacking d. header manipulation Grade:0 User Responses:c. session highjacking Feedback:a. SQL injection attacks user input in web forms that is not correctly filtered. This can be prevented with input validations.95. LDAP injection is an attack on __________________servers. . SQL b. directory c. web d. email Grade:1 User Responses:b. directory Feedback:a. Lightweight Directory Access Protocol is a protocol used to maintain a directory of information such as user accounts or other types of objects.96. XML injection can be prevented with __________________. a. IDS b. IPS c. input validation d. complex passwords Grade:0 User Responses:d. complex passwords Feedback:a. The best way to protect against this (and all code injection techniques for that matter) is to incorporate strong input validation.97. The .. / attack is also known as ________________. a. irectory traversal b. SQL injection c. session highjacking d. header manipulation Grade:1 User Responses:a. directory traversal Feedback:a. Directory traversal, or the .. / (dot dot slash) attack is a method to access unauthorized parent (or worse, root) directories.98. ___________ __ is when commands and command syntax are entered into an application or OS. a. Directory traversal b. Command injection c. Command highjacking d. Code manipulation Grade:1 User Responses:b. Command injection Feedback:a. Command injection is when commands and command syntax are entered into an application or OS.99. Buffer overflows operate against the _________ of the computer. a. NIC b. disk c. CPU d. memory Grade:1 User Responses:d. memory Feedback:a. A buffer overflow is when a process stores data outside of the memory that the developer intended.100. What is the difference between an XSS and XSRF attack? a. The XSS attack exploits the trust a user’s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a user’s browser. b. The XSFR attack exploits the trust a user’s browser has in a website, whereas the XSS attack exploits the trust that a website has in a user’s browser. . The XSS attack creates a buffer overflow on the website, whereas the XSFR attack creates a buffer overflow on the client. d. The XSS attack creates a buffer overflow on the client, whereas the XSFR attack creates a buffer overflow on the website. Grade:1 User Responses:a. The XSS attack exploits the trust a user’s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a user’s browser. Feedback:a. The XSS attack exploits the trust a user’s browser has in a website. The converse of this: the XSRF attack exploits the trust that a website has in a user’s browser. In this attack (also known as a one-click attack), the user’s browser is compromised and transmits unauthorized commands to the website.101. _______________ are placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place. a. Landing spots b. Backdoors c. Hotspots d. Code heels Grade:1 User Responses:b. Backdoors Feedback:a. Backdoors a re placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place.102. An XSS attack is also called a(n) __________________ attack. a. Zero day b. Command injection . Xmas d. Cross site scripting Grade:1 User Responses:d. Cross site scripting Feedback:a. XSS attacks, also called cross site scripting attacks, exploit the trust a user’s browser has in a website through code injection, often in webforms.103. ______________can be used by spyware and can track people without their permission. a. MAC addresses b. Cookies c. IP addresses d. Attachments Grade:1 User Responses:b. Cookies Feedback:a. Cookies are text files placed on the client computer that store information about it, which could include your computer’s browsing habits and possibly user credentials.104. Which of the following attachments is the riskiest to open? a.. exe b.. pdf c.. doc d.. txt Grade:1 User Responses:a.. exe Feedback:a. A . exe or executa ble file is one that contains a program that will do something, perhaps malicious to the computer.105. Stolen cookies can be used to launch a(n) ____________________. a. XSS attack b. SQL injection c. session highjack d. header manipulation Grade:1 User Responses:c. session highjack Feedback:a. Session cookies authenticate you to a server and can be used to highjack your session.106. Header manipulation alters information in ______________ headers. a. LDAP b. file c. HTTP . SQL Grade:1 User Responses:c. HTTP Feedback:a. Header manipulation alters information in HTTP headers and falsifies access.107. An ActiveX control is an example of a(n) _________________. a. cookie b. add-on c. cipher d. virus Grade:1 User Responses:b. add-on Feedback:a. You can enable and disable add-on programs such as ActiveX controls in the Programs tab by clicking the Manage add-ons button in Internet Explorer.108. When an attack targets an operating system vulnerability that is still unknown to the world in general, it is called a __________. a. P2P attack b. zero day attack c. whaling attack d. DDoS attack Grade:1User Responses:b. zero day attack Feedback:a. A zero day attack targets an operating system vulnerability that is still unknown to the world in general.109. __________________is a concept that refers to the monitoring of data in use, data in motion, and data at rest. a. DLP b. DHCP c. DEP d. DMS Grade:1 User Responses:a. DLP Feedback:a. Data Loss Prevention (DLP) is a concept that refers to the monitoring of data in use, data in motion, and data at rest. It does this through content inspection and is designed to prevent unauthorized use of data as well as prevent the leakage of data outside the computer (or network) that it resides.110. Which form of DLP is typically installed in data centers or server rooms? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:c. Storage DLP Feedback:a. Storage DLP systems are typically installed in data centers or server rooms as software that inspect data at rest.111. Which of the following is an example of drive encryption? a. AppLocker b. BitLocker c. Windows defender d. Trusted Platform Module Grade:1 User Responses:b. BitLocker Feedback:a. To encrypt an entire hard disk, you need some kind of full disk encryption software.Several are currently available on the market; one developed by Microsoft is called BitLocker.112. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is ____________ than software encryption. a. more difficult to crack b. easier to use than software encryption c. faster than software encryption d. can be used to calculate data other than encryption keys Grade:1 User Responses:c. faster than software encryption Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors.This means that they are used for encryption during secure login/authentication processes, during digital signings of da ta, and for payment security systems. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is faster than software encryption.113. A _________________ is a chip residing on the motherboard that actually stores the encrypted keys. a. DLP b. DHCP c. DEP d. TPM Grade:1 User Responses:d. TPM Feedback:a. A Trusted Platform Module (TPM) chip is one residing on the motherboard that actually stores the encrypted keys.114. Which of the following is NOT required to encrypt the entire disk in Windows?Choose all that apply. a. TPM chip or USB key b. A hard drive with two volumes c. HSM Module d. Cryptoprocessor Grade:2 User Responses:c. HSM Module,d. Cryptoprocessor Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encrypting the entire disk in Windows. /b. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encry pting the entire disk in Windows.115. Probably the most important security concern with cloud computing is _______________. . less secure connections b. loss of physical control of data c. weak authentication d. bug exploitation Grade:1 User Responses:b. loss of physical control of data Feedback:a. Probably the most important security control concern is the physical control of data that is lost when an organization makes use of cloud computing.116. Which of the following is NOT a solution to security issues surrounding cloud computing? a. Complex passwords b. Strong authentication methods c. Standardization of programming d. Multiple firewalls Grade:1 User Responses:d. Multiple firewalls Feedback:a. Solutions to these security issues include complex passwords, strong authentication methods, encryption, and standardization of programming.117. Which form of DLP is typically installed on individual computers? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 Us er Responses:a. Endpoint DLP Feedback:a. Endpoint DLP systems run on an individual computer and are usually software-based. They monitor data in use such as email communications and can control what information flows between various users.118. Where could you disable the use of removable media on a computer? a. Device manager . BIOS c. Control panel d. Programs and features Grade:1 User Responses:b. BIOS Feedback:a. BIOS settings can be used to reduce the risk of infiltration including disabling removable media including the floppy drives and eSATA and USB ports.119. What are two shortcomings of using BitLocker drive encryption? a. Weak encryption b. Expensive c. Performance suffers d. Shorter drive life Grade:2 User Responses:c. Performance suffers,d. Shorter drive life Feedback:a. A drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well. /b. A drive encrypted with BitLocker usually suffers in perfo rmance compared to a nonencrypted drive and could have a shorter shelf life as well.120. Which form of DLP is typically installed on the perimeter of the network? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solutions that are often installed on the perimeter of the network. They inspect data that is in motion.121. Software as a service (SaaS) is a type of _____________ computing. a. HSM b. cloud c. role-based d. TPM Grade:1 User Responses:b. cloudFeedback:a. Software as a Service (SaaS) is the most commonly used and recognized example of cloud computing. SaaS is when users access applications over the Internet that are provided by a third party.122. Which form of DLP inspects ONLY data in motion? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solut ions that are often installed on the perimeter of the network. They inspect data that is in motion.123. Which of the following is NOT an example of cloud services? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1User Responses:d. BaaS Feedback:a. Examples of cloud services include Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).124. When an electronic control suffers an error, reports the error, and shuts down, it is called_____________. a. Failopen b. Failsafe c. Failclose d. Failshut Grade:1 User Responses:b. Failsafe Feedback:a. When the control fails and shuts down, it is a failsafe. When it fails and leaves a vulnerable system, it is a failopen.125. What should be the first thing you check when an intrusion has been detected? a. Firewall logs b. Server logs c. Workstation logs d.Security patches Grade:1 User Responses:a. Firewall logs Feedback:a. Logging is also important when it comes to a firewall. Firewall logs should be the first th ing you check when an intrusion has been detected. You should know how to access the logs and how to read them.126. Which log on a Windows server is where you could learn if Joe logged in today? a. Applications b. System c. Security d. DNS Grade:1 User Responses:c. Security Feedback:a. The security log contains entries about logins and access to resources both successful and unsuccessful.127. Which of the following is NOT an example of physical security? a. Mantraps b.Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:b. Security logs Feedback:a. Security logs track activities on the network which is logical not physical security.128. Which of the following is NOT a type of door lock? a. Cipher b. Keyed c. Cardkey d. Mantrap Grade:1 User Responses:d. Mantrap Feedback:a. A mantrap is a two door system designed to prevent tailgating.129. Which of the following is NOT an example of operating system hardening? a. Disabling unnecessary services b. Removing the N IC c. Protecting management interfaces d. Password protection Grade:1 User Responses:b. Removing the NIC Feedback:a.Hardening the system should not reduce its functionality, and removing the NIC would do that.130. Which of the following standards is often referred to as port-based security? a. 802. 1x b. 802. 11 c. 802. 11n d. 802. 1 Grade:1 User Responses:a. 802. 1x Feedback:a. 802. 1x enforces perimeter security by keeping the port of the station closed until authentication is complete.131. In which type of monitoring is network traffic analyzed for predetermined attack patterns? a. Signature-based monitoring b. Anomaly-based monitoring c. Behavior-based monitoring d. Reactive-based monitoring Grade:1 User Responses:a. Signature-based monitoringFeedback:a. Network traffic is analyzed for predetermined attack patterns. These attack patterns are known as signatures.132. A(n) __________________ uses baseline reporting and other analyses to discover vulnerabilities and weaknesses in s ystems. a. NAT b. SPA c. SLA d. PSK Grade:1 User Responses:b. SPA Feedback:a. The security posture can be defined as the risk level to which a system, or other technology element, is exposed. Security Posture Assessments (SPA) use baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems.133. Which of the following indicate a problem currently occurring? . Trends b. Baselines c. Alarms d. Averts Grade:1 User Responses:c. Alarms Feedback:a. Although alerts indicate an issue that MAY need attention, alarms indicate a problem currently occurring.134. Which of the following are detection controls? (Choose all that apply. ) a. IDS b. IPS c. Video cameras d. Security guard Grade:2 User Responses:a. IDS,c. Video cameras Feedback:a. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it. /b. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it.135. Which of the following is designed to prevent tailgating? a. Mantraps b. Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:a. Mantraps Feedback:a. Mantraps use double doors to prevent tailgating.136. Which of the following is a proximity reader? a. a security card that transmits the location of the holder b. a device that tracks how close an individual is c. a security card reader that can read the card from a distance d. a card reader that locks the door when the holder is a certain distance from the door Grade:1 User Responses:c. security card reader that can read the card from a distance Feedback:a. These cards use radio waves to transmit to the reader.137. By frequently updating systems and by employing other methods such as group policies and baselining, you _____________ the systems. a. brace b. harden c. virtualize d. hardline Grade:1 User Responses:b. harden Feedback:a. By frequently updating systems and by employing other metho ds such as group policies and baselining, you harden the system.138. Installing service packs is a part of the ___________ process. a. baselining b. hardening c. scaling . security templating Grade:1 User Responses:b. hardening Feedback:a. Hardening the OS is accomplished through the use of service packs, patch management, hotfixes, group policies, security templates, and configuration baselines.139. ______________ can be described as unauthorized WAPs that inadvertently enable access to secure networks. a. Rogue access points b. Evil twin c. War driver d. Phisher Grade:1 User Responses:a. Rogue access points Feedback:a. Rogue access points can be described as unauthorized wireless access points/routers that enable access to secure networks.They differ from an Evil twin in that an Evil twin is strategically placed for the purpose of accessing the network or performing a high jacking attack, whereas rogue access points generally may be placed by employees for their convenience.140. W hich wireless attacks include the introduction of radio interference? a. Rogue Access Point b. Evil twin c. War driver d. Bluesnarfing Grade:1 User Responses:b. Evil twin Feedback:a. The evil twin attack includes jamming the network to cause the stations to associate with the evil twin AP.141. When executing the Evil twin attack, what value must match on the Evil twin and the legitimate AP? . IP address b. SSID c. MAC address d. Admin password Grade:1 User Responses:b. SSID Feedback:a. The Evil twin attack includes jamming the network to cause the stations to associate with the Evil twin AP. The stations will not roam to the Evil twin unless the SSID is the same as the legitimate AP.142. ________________ is when a person attempts to access a wireless network, usually while driving in a vehicle. a. War chalking b. Radiophishing c. War driving d. Bluesnarfing Grade:1 User Responses:c. War driving Feedback:a. War driving is when a person attempts to access a wireless