
CYB125 - Ch9
Authored by Anonymous Anonymous
Information Technology (IT)
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?
Adherence to policy
Ownership
Privacy
Risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Higher degree of privacy
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?
Certification
Event logs
Professional ethics
Remediation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
Service-level agreement (SLA)
Blanket purchase agreement (BPA)
Memorandum of understanding (MOU)
Interconnection security agreement (ISA)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?
Encouraging the adoption of ethical guidelines and standards
Informing users through security awareness training
Communicating the freedom to access all system resources
Understanding common assumptions that lead computer users to unethical behavior
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?
Job rotation
Limiting access
Mandatory vacations
Separation of duties
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?
An organization should collect only what it needs.
An organization should share its information.
An organization should keep its information up to date.
An organization should properly destroy its information when it is no longer needed.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
35 questions
Chapter 3 Mastering Significant Figures and Estimation
Quiz
•
7th Grade - University
40 questions
TIK-9
Quiz
•
8th Grade - University
34 questions
Κεφάλαιο 1ο
Quiz
•
University
40 questions
FLOWCHART-UH2
Quiz
•
9th Grade - University
40 questions
BTUI'24 - Inter-school ICT Quiz - Quarter Finals
Quiz
•
12th Grade - University
40 questions
ISD-topic 4
Quiz
•
University
40 questions
IoT Informatika kelas 9
Quiz
•
9th Grade - University
40 questions
Revision Quiz
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University