Chapter4_SecurityPlanning

Chapter4_SecurityPlanning

University

15 Qs

quiz-placeholder

Similar activities

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

TcP252_k32_FQ1

TcP252_k32_FQ1

University

12 Qs

PRE2 - Sw1

PRE2 - Sw1

University

15 Qs

IS Quiz

IS Quiz

University

10 Qs

Incident Response and Security Quiz 3

Incident Response and Security Quiz 3

University

19 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

cybersecurity-common security infrastructure security

cybersecurity-common security infrastructure security

University

15 Qs

CM- U1L3 -  Windows OS Security Features

CM- U1L3 - Windows OS Security Features

10th Grade - University

20 Qs

Chapter4_SecurityPlanning

Chapter4_SecurityPlanning

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

MON MALBOG

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of an information security program?

To develop a marketing strategy

To establish policies, standards, and practices

To hire more employees

To create a budget for security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of contingency planning?

Business continuity plans

Disaster recovery planning

Incident response planning

Employee training programs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must security policies do to be effective?

Be properly disseminated and understood

Be ignored by employees

Be expensive to implement

Be written in legal jargon

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of standards are formal standards classified as?

De jure standards

Informal standards

De facto standards

Operational standards

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a policy administrator?

To enforce laws

To conduct security audits

To draft all security policies

To manage policy effectiveness

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key technology component that monitors network traffic?

Intrusion Detection System (IDS)

Proxy Server

Cache Server

Firewall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a clean desk policy require?

No personal items on desks

All documents to be shredded

Classified information to be stored securely

Employees to work from home

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?