Chapter 9 Quiz

Quiz
•
Computers
•
Professional Development
•
Hard
Lauren Gutierrez
Used 4+ times
FREE Resource
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? Procedures help enforce the intent of a policy.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? Configuration changes can be made at any time during a system life cycle, and no process is required.
True
False
Answer explanation
It is important that all configuration changes occur only within a controlled process. Uncontrolled configuration changes often result in conflicts and even new security vulnerabilities.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these types of classification decisions?
Value
Criticality
Threat
Sensitivity
Answer explanation
The three criteria normally used to make classification decisions are value, sensitivity, and criticality.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? The Common Criteria is a set of system procurement standards used by several countries.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
Higher degree of privacy
Answer explanation
In this scenario, Mark is most likely to achieve access to a high level of expertise because security vendors focus exclusively on providing advanced security services.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
True or False? The idea that users should be granted only the levels of permissions they need to perform their duties is called the principle of least privilege.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the correct order of change control procedures regarding changes to systems and networks?
Request, approval, impact assessment, build/test, monitor, implement
Request, approval, impact assessment, build/test, implement, monitor
Request, impact assessment, approval, build/test, monitor, implement
Request, impact assessment, approval, build/test, implement, monitor
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Cyber Security

Quiz
•
5th Grade - Professio...
18 questions
CYBER SECURITY

Quiz
•
Professional Development
20 questions
Communication - 2nd Semester Grade 9 Maya School

Quiz
•
Professional Development
22 questions
Day 4 - Security I - Day 3 Review - 1st Review

Quiz
•
Professional Development
20 questions
Health and Safety

Quiz
•
Professional Development
20 questions
Technology

Quiz
•
Professional Development
22 questions
CISSP Asset Quiz

Quiz
•
Professional Development
18 questions
Cycle 4: Session 13 Final Review.

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade