Search Header Logo

CYB125 - Ch9

Authored by Anonymous Anonymous

Information Technology (IT)

University

CYB125 - Ch9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?

Adherence to policy

Ownership

Privacy

Risk

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

Higher degree of privacy

Access to a higher level of expertise

Developing in-house talent

Building internal knowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?

Certification

Event logs

Professional ethics

Remediation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Service-level agreement (SLA)

Blanket purchase agreement (BPA)

Memorandum of understanding (MOU)

Interconnection security agreement (ISA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?

Encouraging the adoption of ethical guidelines and standards

Informing users through security awareness training

Communicating the freedom to access all system resources

Understanding common assumptions that lead computer users to unethical behavior

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?

Job rotation

Limiting access

Mandatory vacations

Separation of duties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?

An organization should collect only what it needs.

An organization should share its information.

An organization should keep its information up to date.

An organization should properly destroy its information when it is no longer needed.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?