
Chapter 8
Authored by Stella Lai
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a person knowingly accesses a government computer without permission, what federal act laws would the person be subject to?
SOX
ECPA
CFAA
GLBA
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Unauthorized visitors have entered a company office and are walking around the building. What two measures can be implemented to prevent unauthorized visitor access to the building? (Choose two.)
Lock cabinets.
Conduct security awareness training regularly.
Prohibit exiting the building during working hours.
Establish policies and procedures for guests visiting the building.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
An auditor is asked to assess the LAN of a company for potential threats. What are three potential threats the auditor may point out? (Choose three.)
the acceptable use policy
a misconfigured firewall
unauthorized port scanning and network probing
complex passwords
unlocked access to network equipment
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A company has had several incidents involving users downloading unauthorized software, using unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to manage the user threats. What three things might be put in place to manage the threats? (Choose three.)
Use content filtering.
Implement disciplinary action.
Provide security awareness training.
Disable CD and USB access.
Monitor all activity by the users.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As part of HR policy in a company, an individual may opt-out of having information shared with any third party other than the employer. Which law protects the privacy of personal shared information?
PCI
FIRPA
SOX
GLBA
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can be used to rate threats by an impact score to emphasize important vulnerabilities?
ACSC
ISC
NVD
CERT
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?
SOX
ECPA
GLBA
PCI DSS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
The Rise of Intelligent Machines
Quiz
•
8th Grade - University
20 questions
WEB DESIGN QUIZ P2
Quiz
•
12th Grade
15 questions
Imaging and Design
Quiz
•
11th - 12th Grade
15 questions
EmTech Module 1.1 Pretest
Quiz
•
12th Grade
20 questions
Skill Competition Quiz 2024
Quiz
•
10th Grade - University
17 questions
Grade 4 Computer Science Quiz
Quiz
•
4th Grade - University
14 questions
Microsoft Excel Advanced Features
Quiz
•
1st Grade - University
20 questions
Processing- The CPU Quiz
Quiz
•
10th Grade - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade