
Chapter 9 Quiz
Authored by Lauren Gutierrez
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? Procedures help enforce the intent of a policy.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? Configuration changes can be made at any time during a system life cycle, and no process is required.
True
False
Answer explanation
It is important that all configuration changes occur only within a controlled process. Uncontrolled configuration changes often result in conflicts and even new security vulnerabilities.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these types of classification decisions?
Value
Criticality
Threat
Sensitivity
Answer explanation
The three criteria normally used to make classification decisions are value, sensitivity, and criticality.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? The Common Criteria is a set of system procurement standards used by several countries.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
Higher degree of privacy
Answer explanation
In this scenario, Mark is most likely to achieve access to a high level of expertise because security vendors focus exclusively on providing advanced security services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? The idea that users should be granted only the levels of permissions they need to perform their duties is called the principle of least privilege.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the correct order of change control procedures regarding changes to systems and networks?
Request, approval, impact assessment, build/test, monitor, implement
Request, approval, impact assessment, build/test, implement, monitor
Request, impact assessment, approval, build/test, monitor, implement
Request, impact assessment, approval, build/test, implement, monitor
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?