CYB125 - Ch9

CYB125 - Ch9

University

39 Qs

quiz-placeholder

Similar activities

Quiz-Applied OS

Quiz-Applied OS

University

40 Qs

A+ Core II Days 7-9

A+ Core II Days 7-9

University

44 Qs

IT REVIEW

IT REVIEW

9th Grade - University

40 Qs

Re Assessment

Re Assessment

University

35 Qs

Usability Engineering Quiz

Usability Engineering Quiz

University

40 Qs

Long Quiz # 2 System Administration Activities

Long Quiz # 2 System Administration Activities

University

40 Qs

Chapter 2.2.2 RFID Technology

Chapter 2.2.2 RFID Technology

7th Grade - University

35 Qs

itn 200 part 1

itn 200 part 1

University

39 Qs

CYB125 - Ch9

CYB125 - Ch9

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Damon Vogel

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?

Adherence to policy

Ownership

Privacy

Risk

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

Higher degree of privacy

Access to a higher level of expertise

Developing in-house talent

Building internal knowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?

Certification

Event logs

Professional ethics

Remediation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Service-level agreement (SLA)

Blanket purchase agreement (BPA)

Memorandum of understanding (MOU)

Interconnection security agreement (ISA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?

Encouraging the adoption of ethical guidelines and standards

Informing users through security awareness training

Communicating the freedom to access all system resources

Understanding common assumptions that lead computer users to unethical behavior

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?

Job rotation

Limiting access

Mandatory vacations

Separation of duties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?

An organization should collect only what it needs.

An organization should share its information.

An organization should keep its information up to date.

An organization should properly destroy its information when it is no longer needed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?