Search Header Logo

EA Program Security and Privacy Quiz 2

Authored by Marygrace Contillo

Computers

University

Used 2+ times

EA Program Security and Privacy Quiz 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to include IT security in an EA program and the documentation of EA components?

To increase the cost of the enterprise

To complicate the operational processes

To ensure the protection of IT resources and information

To slow down the technological advancements

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the basic areas of an Security and Privacy Program?

Financial Security, Legal Security, Data Security, Network Security

Information Security, Personnel Security, Operational Security, Physical Security

Software Security, Hardware Security, Cloud Security, Mobile Security

Social Security, Health Security, Environmental Security, Educational Security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Physical Security issues that should be reflected in the IT Security Plan?

Software Security, Hardware Security, Cloud Security, Mobile Security

Network Operation Centers, Server Rooms, Wiring Closets, Cable Plants

Building Security, Cable Plants, Software Security, Network Security

Building Security, Network Operation Centers, Server Rooms, Wiring Closets

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Personnel Security issues that should be reflected in the IT Security Plan?

Building Security, Network Operation Centers, Server Rooms, Wiring Closets

User Authentication, Awareness Training, Procedures Training

Design, Assurance, Authentication, Access

Risk Assessment, Testing and Evaluation, Vulnerability Remediation, Disaster Recovery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Information Security issues that should be reflected in the IT Security Plan?

Building Security, Network Operation Centers, Server Rooms, Wiring Closets

Risk Assessment, Testing and Evaluation, Vulnerability Remediation, Disaster Recovery

Design, Assurance, Authentication, Access

User Authentication, Awareness Training, Procedures Training

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Operational Security issues that should be reflected in the IT Security Plan?

User Authentication, Awareness Training, Procedures Training

Design, Assurance, Authentication, Access

Standard Operating Procedures, Component Security Testing and Evaluation, Vulnerability Remediation

Risk Assessment, Testing and Evaluation, Vulnerability Remediation, Disaster Recovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are there no 100 percent fool-proof IT Security solutions?

Because IT security is too expensive

Because IT security is not important

Because IT components are designed and managed by humans

Because IT security is not effective

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?