Our Special Survivors' Guide TechQuiz Results

Thanks to everyone who participated in our special Survivors' Guide TechQuiz! Stop by to see the list of our top three winners of a $100 Amazon.com gift certificate and to

January 29, 2005

3 Min Read
Network Computing logo

The Questions and Correct Answers:

Which is the basic ROI model used for tallying your patch management costs?

1. cost = (hourly rate) / (employee labor hour) x (number of systems)
2. cost = (employee labor hour) x (hourly rate) x (number of systems)
3. cost = (number of systems) x (employee labor hour) + (employee labor hour)
4. cost = (number of patches) x (number of systems) / (employee labor hour)
Correct: 46 percent

How many subcomponents does a Web tier have?
1. 7
2. 4

3. 2
4. 11
Correct: 43 percent

iSCSI devices can limit access to logical drives through all but which method?
1. IP address
2. IQN
3. LEAP
4. CHAP
Correct: 37 percent

Which of the following is NOT a vendor supported IEEE standard?

1. 802.3af
2. 802.1X
3. 802.3ad
4. 802.eil
Correct: 46 percentWhich of the following is not an obstacle to business-driven wireless deployment?
1. Confusion about offerings
2. Concerns about security
3. GPRS intergration

4. Sparse coverage
Correct: 56 percent

Which of the following is NOT an access protocol for Enterprise Information Integration platforms?
1. ODBC/JDBC
2. XML over HTTP
3. JAVA
4. SOAP
Correct: 39 percent

Which proof of concept code was the first exploit built for the Pocket PC platform?

1. WinXP.6.ButzC
2. Backdoor.Rbot.gen
3. Mosquit
4. WinCE4.Duts.A
Correct: 44 percent

The biggest vulnerability to outsourcing VoIP implementation is:
1. Relinquishing control over VoIP Security
2. Losing connectivity with the provider

3. Expense
4. The limited nubmer of providers
Correct: 35 percent

The number of unique visitors to a given site are often inflated due PRIMARILY to which circumstance?
1. Users clearing cookies
2. Pop-up blockers
3. Users switching between home and work machines
4. Web technology incompatibilities (javascript, html)
Correct: 31 percentWhich of the following worms utilized multiple protocol vectors?

1. CodeRed
2. Welchia.C
3. Slammer
4. Nimda
Correct: 31 percent

What does DoD 5015.2 specify?
1. Minimum functionality necessary to meet HIPAA regulations
2. Security requirements for data storage and dissemination
3. Minimum functionality necessary to meet NARA regulations

4. Minimum data retention requirements
Correct: 38 percent

A Fibre Channel interface can support?
1. 100MB/sec
2. 80MB/sec
3. 264MB/sec
4. 1TB/sec
Correct: 26 percent

What shape is the Wi-Fi coverage created by an omni-directional dipole antenna?

1. Butterfly Wings
2. Exclamation Point
3. Semi-Circle
4. Donut
Correct: 33 percent

What does Recovery Point Objective mean?
1. The level of capability to be achieved by a certain time after an outage
2. The point in time that a system must be recovered after an outage
3. A physical location where recovery operations are conducted

4. Something very different from a subjective recovery point
Correct: 50 percent

Don't forget to try your hand at our TechQuizes this year!

Read more about:

2005
SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights