
EA Program Security and Privacy Quiz
Authored by Marygrace Contillo
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Why is it important to include IT security in an EA program and the documentation of EA components?
To slow down the enterprise's strategic initiatives
To ensure foolproof security solutions
To increase the cost of implementing EA components
To protect IT resources from unauthorized access and use
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the basic areas of an Security and Privacy Program?
Financial Security, Customer Security, Data Security, Network Security
Social Security, Health Security, Environmental Security, Political Security
Information Security, Personnel Security, Operational Security, Physical Security
Software Security, Hardware Security, Cloud Security, Mobile Security
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the Physical Security issues that should be reflected in the IT Security Plan?
Network Security, Personnel Security, Information Security, Operations Security
Building Security, Cable Plants, Software Security, Data Centers
Hardware Security, Access Control, Disaster Recovery, Biometric Scans
Building Security, Network Operation Centers, Cable Plants, Server Rooms
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the Personnel Security issues that should be reflected in the IT Security Plan?
User Authentication, Awareness Training, Procedures Training
Building Security, Network Operation Centers, Cable Plants, Server Rooms
Risk Assessment, Testing and Evaluation, Vulnerability Remediation
Disaster Recovery, Continuity of Operations, Standard Operating Procedures
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the Information Security issues that should be reflected in the IT Security Plan?
Building Security, Cable Plants, Software Security, Data Centers
Design, Assurance, Authentication, Access
Risk Assessment, Testing and Evaluation, Vulnerability Remediation
Disaster Recovery, Continuity of Operations, Standard Operating Procedures
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the Operational Security issues that should be reflected in the IT Security Plan?
User Authentication, Awareness Training, Procedures Training
Component Certification and Accreditation, Standard Operating Procedures, Disaster Recovery
Building Security, Network Operation Centers, Cable Plants, Server Rooms
Risk Assessment, Testing and Evaluation, Vulnerability Remediation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Why are there no 100 percent fool-proof IT Security solutions?
Because IT security is too expensive to implement
Because IT security is not important
Because IT security is always perfect
Because insider threats can compromise security solutions
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?