CIS 333 Course Experience Tradition/ snaptutorial.com
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 1 Quiz 2 • Question 1 E-commerce systems and applications demand strict C-I-A ________. • Question 2 During the late 1980s into the early 1990s, service providers converted the core switches at their central offices from ______________ to digital central office (CO) switches.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 1 Quiz • Question 1 The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site. • Question 2 ____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 2 Quiz 3 • Question 1 A(n) ___________ fingerprint scanner is a software program that allows an attacker to send logon packets to an IP host device. • Question 2 What is meant by firewall?
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 2 Quiz 4 • Question 1 Which of the following best describes quantitative risk analysis? • Question 2 ________ is the difference between the security controls you have in place and the controls you need to have in place in order to address all vulnerabilities.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 3 Case Study 1: Bring Your Own Device (BYOD) Case Study 1: Bring Your Own Device (BYOD) Due Week 3 and worth 60 points Read the following articles located in the course shell: “The dark side of BYOD” from TechRepublic and “BYOD As We Know It Is Dead” from Forbes. Write a two to three (2-3) page paper in which you: Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user’s overall working experience.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 3 Quiz 6 • Question 1 What term is used to describe a benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products? • Question 2 Because personnel are so important to solid security, one of the best security controls you can develop is a strong security ___________ and awareness program.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Due Week 4 and worth 75 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 4 Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Due Week 4 and worth 75 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 4 Quiz 7 • Question 1 It’s essential to match your organization’s required __________ with its security structure. • Question 2 ________ provides information on what is happening as it happens.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 6 Case Study 2: Public Key Infrastructure Case Study 2: Public Key Infrastructure Due Week 6 and worth 60 points Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 8 Assignment 2 Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 8 Assignment 2: Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 10 Technical Project Paper: Information Systems Security Technical Project Paper: Information Systems Security Due Week 10 and worth 150 points Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared toward protecting medication and funds located on the premises, as well as the customers
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 11 Exam • Question 1 The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists. • Question 2 Connecting your computers or devices to the ________ immediately exposes them to attack.
CIS 333 Course Experience Tradition/ snaptutorial.com CIS 333 Week 11 Exam • Question 1 The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists. • Question 2 Connecting your computers or devices to the ________ immediately exposes them to attack.
CIS 333 Course Experience Tradition/ snaptutorial.com