
Chapter4_SecurityPlanning
Authored by MON MALBOG
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of an information security program?
To develop a marketing strategy
To establish policies, standards, and practices
To hire more employees
To create a budget for security
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a component of contingency planning?
Business continuity plans
Disaster recovery planning
Incident response planning
Employee training programs
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What must security policies do to be effective?
Be properly disseminated and understood
Be ignored by employees
Be expensive to implement
Be written in legal jargon
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of standards are formal standards classified as?
De jure standards
Informal standards
De facto standards
Operational standards
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of a policy administrator?
To enforce laws
To conduct security audits
To draft all security policies
To manage policy effectiveness
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a key technology component that monitors network traffic?
Intrusion Detection System (IDS)
Proxy Server
Cache Server
Firewall
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a clean desk policy require?
No personal items on desks
All documents to be shredded
Classified information to be stored securely
Employees to work from home
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?