Chapter4_SecurityPlanning

Chapter4_SecurityPlanning

University

15 Qs

quiz-placeholder

Similar activities

Exploring Software Development and UX

Exploring Software Development and UX

University

15 Qs

CI2214 Chapter 1

CI2214 Chapter 1

University

20 Qs

Introduction to Machine Learning

Introduction to Machine Learning

University

17 Qs

GDPR and Advertising Standards Quiz

GDPR and Advertising Standards Quiz

University

10 Qs

Quiz on Vulnerabilities and Risk Assessment

Quiz on Vulnerabilities and Risk Assessment

University

15 Qs

IT 311r7_module 1 review quiz

IT 311r7_module 1 review quiz

University

12 Qs

Chapter 8 Quiz II

Chapter 8 Quiz II

University

10 Qs

Information Security Quiz

Information Security Quiz

University

20 Qs

Chapter4_SecurityPlanning

Chapter4_SecurityPlanning

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

MON MALBOG

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of an information security program?

To develop a marketing strategy

To establish policies, standards, and practices

To hire more employees

To create a budget for security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of contingency planning?

Business continuity plans

Disaster recovery planning

Incident response planning

Employee training programs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must security policies do to be effective?

Be properly disseminated and understood

Be ignored by employees

Be expensive to implement

Be written in legal jargon

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of standards are formal standards classified as?

De jure standards

Informal standards

De facto standards

Operational standards

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a policy administrator?

To enforce laws

To conduct security audits

To draft all security policies

To manage policy effectiveness

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key technology component that monitors network traffic?

Intrusion Detection System (IDS)

Proxy Server

Cache Server

Firewall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a clean desk policy require?

No personal items on desks

All documents to be shredded

Classified information to be stored securely

Employees to work from home

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?