Our Special Survivors' Guide TechQuiz Results
Thanks to everyone who participated in our special Survivors' Guide TechQuiz! Stop by to see the list of our top three winners of a $100 Amazon.com gift certificate and to
January 29, 2005
The Questions and Correct Answers:
Which is the basic ROI model used for tallying your patch management costs?
1. cost = (hourly rate) / (employee labor hour) x (number of systems)
2. cost = (employee labor hour) x (hourly rate) x (number of systems)
3. cost = (number of systems) x (employee labor hour) + (employee labor hour)
4. cost = (number of patches) x (number of systems) / (employee labor hour)
Correct: 46 percent
How many subcomponents does a Web tier have?
1. 7
2. 4
3. 2
4. 11
Correct: 43 percent
iSCSI devices can limit access to logical drives through all but which method?
1. IP address
2. IQN
3. LEAP
4. CHAP
Correct: 37 percent
Which of the following is NOT a vendor supported IEEE standard?
1. 802.3af
2. 802.1X
3. 802.3ad
4. 802.eil
Correct: 46 percentWhich of the following is not an obstacle to business-driven wireless deployment?
1. Confusion about offerings
2. Concerns about security
3. GPRS intergration
4. Sparse coverage
Correct: 56 percent
Which of the following is NOT an access protocol for Enterprise Information Integration platforms?
1. ODBC/JDBC
2. XML over HTTP
3. JAVA
4. SOAP
Correct: 39 percent
Which proof of concept code was the first exploit built for the Pocket PC platform?
1. WinXP.6.ButzC
2. Backdoor.Rbot.gen
3. Mosquit
4. WinCE4.Duts.A
Correct: 44 percent
The biggest vulnerability to outsourcing VoIP implementation is:
1. Relinquishing control over VoIP Security
2. Losing connectivity with the provider
3. Expense
4. The limited nubmer of providers
Correct: 35 percent
The number of unique visitors to a given site are often inflated due PRIMARILY to which circumstance?
1. Users clearing cookies
2. Pop-up blockers
3. Users switching between home and work machines
4. Web technology incompatibilities (javascript, html)
Correct: 31 percentWhich of the following worms utilized multiple protocol vectors?
1. CodeRed
2. Welchia.C
3. Slammer
4. Nimda
Correct: 31 percent
What does DoD 5015.2 specify?
1. Minimum functionality necessary to meet HIPAA regulations
2. Security requirements for data storage and dissemination
3. Minimum functionality necessary to meet NARA regulations
4. Minimum data retention requirements
Correct: 38 percent
A Fibre Channel interface can support?
1. 100MB/sec
2. 80MB/sec
3. 264MB/sec
4. 1TB/sec
Correct: 26 percent
What shape is the Wi-Fi coverage created by an omni-directional dipole antenna?
1. Butterfly Wings
2. Exclamation Point
3. Semi-Circle
4. Donut
Correct: 33 percent
What does Recovery Point Objective mean?
1. The level of capability to be achieved by a certain time after an outage
2. The point in time that a system must be recovered after an outage
3. A physical location where recovery operations are conducted
4. Something very different from a subjective recovery point
Correct: 50 percent
Don't forget to try your hand at our TechQuizes this year!
Read more about:
2005You May Also Like