Title: CIS 333 Slingshot Academy / snaptutorial.com
1CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
Education is everything - education is your
power, education is your way in life for whatever
you want to do.
2CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 1 Quiz 2
Question 1
E-commerce systems and applications demand strict
C-I-A ________.
Question 2 During the
late 1980s into the early 1990s, service
providers converted the core switches at their
central offices from ______________ to digital
central office (CO) switches.
3CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 1 Quiz
Question 1
The tunnel can be created between a remote
workstation using the public Internet and a VPN
router or a secure browser and ________ Web site.
Question 2
____________ is the amount of time it takes to
recover and make a system, application, and data
available for use after an outage.
4CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 2 Quiz 3
Question 1 A(n)
___________ fingerprint scanner is a software
program that allows an attacker to send logon
packets to an IP host device.
Question 2 What is meant by
firewall?
Question 3
________ is a type of attack in
which the attacker takes control of a session
between two machines and masquerades as one of
them.
5CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 2 Quiz 4
Question 1 Which of
the following best describes quantitative risk
analysis?
Question 2
________ is the difference between the security
controls you have in place and the controls you
need to have in place in order to address all
vulnerabilities.
6CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 3 Case Study 1 Bring Your Own
Device (BYOD)
Case Study 1 Bring Your Own Device (BYOD) Due
Week 3 and worth 60 points Read the following
articles located in the course shell The dark
side of BYOD from TechRepublic and BYOD As We
Know It Is Dead from Forbes. Write a two to
three (2-3) page paper in which you Identify the
primary benefits of BYOD in organizations, and
determine the key ways in which its concepts can
enhance an end users overall working experience.
7CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 3 Quiz 6
Question 1 What
term is used to describe a benchmark used to make
sure that a system provides a minimum level of
security across multiple applications and across
different products?
Question 2
Because personnel are so important to solid
security, one of the best security controls you
can develop is a strong security ___________ and
awareness program.
8CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 4 Assignment 1 Identifying Potential
Malicious Attacks, Threats, and Vulnerabilities
Assignment 1 Identifying Potential Malicious
Attacks, Threats, and Vulnerabilities Due Week 4
and worth 75 points You have just been hired as
an Information Security Engineer for a videogame
development company. The organization network
structure is identified in the below network
diagram and specifically contains 1) 2
Firewalls
9CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 4 Assignment 1 Identifying
Potential Malicious Attacks, Threats, and
Vulnerabilities
Assignment 1 Identifying Potential Malicious
Attacks, Threats, and Vulnerabilities Due Week 4
and worth 75 points You have just been hired as
an Information Security Engineer for a videogame
development company. The organization network
structure is identified in the below network
diagram and specifically contains 1) 2
Firewalls
10CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 4 Quiz 7
Question 1 Its
essential to match your organizations required
__________ with its security structure.
Question 2
________ provides information on
what is happening as it happens
Question 3
Which of the following is the definition of
anomaly-based IDS?
11CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 6 Case Study 2 Public Key
Infrastructure
Case Study 2 Public Key Infrastructure Due Week
6 and worth 60 points Suppose you are the
Information Security Director at a small software
company. The organization currently utilizes a
Microsoft Server 2012 Active Directory domain
administered by your information security team.
Mostly software developers and a relatively small
number of administrative personnel comprise the
remainder of the organization
12CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 8 Assignment 2 Identifying Potential
Risk, Response, and Recovery
Assignment 2 Identifying Potential Risk,
Response, and Recovery Due Week 8 and worth 75
points In Assignment 1, a videogame development
company recently hired you as an Information
Security Engineer. After viewing a growing number
of reports detailing malicious activity, the CIO
requested that you draft a report in which you
identify potential malicious attacks and threats
specific to your organization. She asked you to
include a brief explanation of each item and the
potential impact it could have on the
organization.
13CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 8 Assignment 2 Identifying
Potential Risk, Response, and Recovery
Assignment 2 Identifying Potential Risk,
Response, and Recovery Due Week 8 and worth 75
points In Assignment 1, a videogame development
company recently hired you as an Information
Security Engineer. After viewing a growing number
of reports detailing malicious activity, the CIO
requested that you draft a report in which you
identify potential malicious attacks and threats
specific to your organization. She asked you to
include a brief explanation of each item and the
potential impact it could have on the
organization.
14CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 10 Technical Project Paper
Information Systems Security
Technical Project Paper Information Systems
Security Due Week 10 and worth 150 points
Suppose you are the IT professional in charge of
security for a small pharmacy that has recently
opened within a shopping mall. The daily
operation of a pharmacy is a unique business that
requires a combination of both physical and
logical access controls geared toward protecting
medication and funds located on the premises
15CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
CIS 333 Week 11 Exam
Question 1 The world
needs people who understand computer-systems
________ and who can protect computers and
networks from criminals and terrorists.
Question 2
Connecting your computers or devices to the
________ immediately exposes them to attack.
16CIS 333
www.snaptutorial.com
CIS 333 Slingshot Academy
Education is everything - education is your
power, education is your way in life for whatever
you want to do.
For more best Courses / Tutorials
Visit Now
www.snaptutorial.com