Search Header Logo

Chapter 8

Authored by Stella Lai

Computers

12th Grade

Used 2+ times

Chapter 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a person knowingly accesses a government computer without permission, what federal act laws would the person be subject to?

SOX

ECPA

CFAA

GLBA

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Unauthorized visitors have entered a company office and are walking around the building. What two measures can be implemented to prevent unauthorized visitor access to the building? (Choose two.)

Lock cabinets.

Conduct security awareness training regularly.

Prohibit exiting the building during working hours.

Establish policies and procedures for guests visiting the building.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An auditor is asked to assess the LAN of a company for potential threats. What are three potential threats the auditor may point out? (Choose three.)

the acceptable use policy

a misconfigured firewall

unauthorized port scanning and network probing

complex passwords

unlocked access to network equipment

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A company has had several incidents involving users downloading unauthorized software, using unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to manage the user threats. What three things might be put in place to manage the threats? (Choose three.)

Use content filtering.

Implement disciplinary action.

Provide security awareness training.

Disable CD and USB access.

Monitor all activity by the users.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As part of HR policy in a company, an individual may opt-out of having information shared with any third party other than the employer. Which law protects the privacy of personal shared information?

PCI

FIRPA

SOX

GLBA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be used to rate threats by an impact score to emphasize important vulnerabilities?

ACSC

ISC

NVD

CERT

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?

SOX

ECPA

GLBA

PCI DSS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers