0% found this document useful (0 votes)
11 views3 pages

Homework 2

The document contains a homework assignment for BFOR 200, featuring true/false questions, multiple choice questions, and completion prompts related to network security, backup strategies, and cloud computing. It includes questions about the security of WiFi, the effectiveness of software updates, and the '3-2-1' backup rule. Additionally, it asks students to design a new multiple choice question on a previously covered topic.

Uploaded by

blake1warner
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

Homework 2

The document contains a homework assignment for BFOR 200, featuring true/false questions, multiple choice questions, and completion prompts related to network security, backup strategies, and cloud computing. It includes questions about the security of WiFi, the effectiveness of software updates, and the '3-2-1' backup rule. Additionally, it asks students to design a new multiple choice question on a previously covered topic.

Uploaded by

blake1warner
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

BFOR 200 Homework 2

BFOR 200 Homework 2


True/False
1) WiFi is inherently secure because it is very difficult to intercept messages between devices and
wireless access points. [ F ]
2) Battery systems can provide uninterrupted power for a short period of time (~1 hour). [ T ]
3) At least one full backup should be located off-site, on a separate network [ T ]
4) Software updates are very effective at reducing the risk of malware [ T ]
5) Outsourcing computing needs to a cloud provider is typically riskier and more expensive than
maintaining in-house systems. [ F ]
6) It is best to keep all backups locally (instead of remotely or in the cloud) because it ensures control
over the data and guarantees fast recovery. [ F ]

Multiple Choice
7) This network device moves traffic between networks.
a) Switch
b) Wireless Access Point
c) Hub
d) Router
8) __________ use network information (like IP addresses and port numbers) to restrict the types of
traffic that can be sent to a device or network.
a) Antivirus tools
b) Firewalls
c) Switches
d) Passwords
9) Which storage medium is best for long-term backups (years or decades)
a) Hard Disk Drives (HDDs)
b) Solid-State Drives (SSDs)
c) Tape Drives
d) Floppy Disks
10) This type of malware modifies other programs and inserts its own code.
a) Virus
b) Worm
c) Trojan Horse
d) Ransomware
11) A highly specialized system used to monitor industrial processes.
a) Mainframe
b) SCADA
c) Network-attached storage (NAS)
d) Router

1
BFOR 200 Homework 2

12) A _____________ creates a secure connection between networks when using public infrastructure
(i.e. the Internet).
a) Firewall
b) Router
c) Leased lines
d) VPNs
13) A document that contains procedures and protocols for a company to follow if an adverse event
occurs.
a) Continuity Plan
b) Panic Manual
c) Mission Statement
d) Terms & Conditions
14) In this model of cloud computing, the cloud provider manages authentication, including multi-factor
authentication options (like Duo, for example).
a) Infrastructure-as-a-Service (IaaS)
b) Platform-as-a-Service (PaaS)
c) Software-as-a-Service (SaaS)
d) Identity-as-a-Service (IDaaS)

Completion
15) What are the strengths and weaknesses of guided media (e.g. cables) and unguided media (e.g.
wireless & satellites)?

Unguided media is easier to access globally but information can be lost much easier. Guided media is
more direct but slower and not available globally.

16) The university is looking to add more network capacity between the uptown and downtown
campuses. Should they use a VPN or install a dedicated circuit?

They should install a dedicated circuit, a VPN is used to keep your data private and search the internet
without outside interference.

17) Describe each part of the “3-2-1” rule of backups.

At least 3 copies of all data

Two different storage media (hard drive, tape, cloud)

At least one off-site backup

2
BFOR 200 Homework 2

Question Design
Please design a multiple choice question for a topic that we have covered in the previous few weeks. It
must be different than those already used in the course. Make sure to highlight the correct answer. This
question may be used on an exam.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy