CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

University

10 Qs

quiz-placeholder

Similar activities

CNET251 - Ch 6 -Risk Management- Assessing Risk

CNET251 - Ch 6 -Risk Management- Assessing Risk

University

10 Qs

Information Assurance and Security

Information Assurance and Security

University

12 Qs

DFC 2353: QUIZ 2

DFC 2353: QUIZ 2

University

10 Qs

CyberCell360

CyberCell360

University

10 Qs

Unit 3 - 4.1.4 Application Security

Unit 3 - 4.1.4 Application Security

9th Grade - University

10 Qs

Re-Quiz : Developing Your Security Policy (Chapter 2)

Re-Quiz : Developing Your Security Policy (Chapter 2)

University

11 Qs

CNET251 Chapt 3 Governance & Strategic Planning for Security

CNET251 Chapt 3 Governance & Strategic Planning for Security

University

10 Qs

science day competition(Networks & Information Security)

science day competition(Networks & Information Security)

University

15 Qs

CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

Assessment

Quiz

Computers

University

Medium

Created by

N M

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is important to consider short-term and long-term

objectives to develop a comprehensive and effective

information security program.

TRUE

FALSE

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Thoroughly understand your organization’s ______________ are the insights to determine info security program objectives.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patch management and vulnerability remediation is essential for addressing_______.

increasing risk

ignore vulnerabilities

known vulnerabilities and reducing the risk

cause potential damage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A well defined policy serves as cornerstone of an info security program, outlining the rules and regulations.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

THREE categories of security controls are operational, technical and _________ controls

strategic

management

risk

threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Key services in info security services are followings EXCEPT __________.

Vulnerability management service

Malware detection services

Log monitoring services

Military services

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

DiD stands for _________, to safeguard sensitive info.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?