Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?

CYB125 - Ch9

Quiz
•
Information Technology (IT)
•
University
•
Hard

Damon Vogel
FREE Resource
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Adherence to policy
Ownership
Privacy
Risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Higher degree of privacy
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?
Certification
Event logs
Professional ethics
Remediation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
Service-level agreement (SLA)
Blanket purchase agreement (BPA)
Memorandum of understanding (MOU)
Interconnection security agreement (ISA)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?
Encouraging the adoption of ethical guidelines and standards
Informing users through security awareness training
Communicating the freedom to access all system resources
Understanding common assumptions that lead computer users to unethical behavior
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?
Job rotation
Limiting access
Mandatory vacations
Separation of duties
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?
An organization should collect only what it needs.
An organization should share its information.
An organization should keep its information up to date.
An organization should properly destroy its information when it is no longer needed.
Create a free account and access millions of resources
Similar Resources on Quizizz
40 questions
CYB125 - Ch6

Quiz
•
University
35 questions
Database Concepts Review Quiz

Quiz
•
University
40 questions
Infinity Code Nexus

Quiz
•
University
40 questions
Long Quiz # 2 SDLC and Project Management

Quiz
•
University
39 questions
itn 200 part 1

Quiz
•
University
35 questions
Photography Quiz

Quiz
•
University
36 questions
CYB125 - Ch11

Quiz
•
University
39 questions
CYB125 - Ch8

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade