
CYB125 - Ch9

Quiz
•
Information Technology (IT)
•
University
•
Hard

Damon Vogel
FREE Resource
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?
Adherence to policy
Ownership
Privacy
Risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Higher degree of privacy
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?
Certification
Event logs
Professional ethics
Remediation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
Service-level agreement (SLA)
Blanket purchase agreement (BPA)
Memorandum of understanding (MOU)
Interconnection security agreement (ISA)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?
Encouraging the adoption of ethical guidelines and standards
Informing users through security awareness training
Communicating the freedom to access all system resources
Understanding common assumptions that lead computer users to unethical behavior
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?
Job rotation
Limiting access
Mandatory vacations
Separation of duties
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?
An organization should collect only what it needs.
An organization should share its information.
An organization should keep its information up to date.
An organization should properly destroy its information when it is no longer needed.
Create a free account and access millions of resources
Similar Resources on Wayground
42 questions
Cyber Security Basics

Quiz
•
University
34 questions
Computer Networking Challenge

Quiz
•
University
35 questions
Photography Quiz

Quiz
•
University
40 questions
SA101 A Quiz 1

Quiz
•
University
40 questions
Architecture

Quiz
•
University
36 questions
CYB125 - Ch3

Quiz
•
University
36 questions
CYB125 - Ch11

Quiz
•
University
35 questions
Exam CNSA

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade