Computer Networking > QUESTIONS & ANSWERS > LIBERTY UNIVERSITY CSIS 340 Final Exam 1 QUESTIONS WITH ALL VERIFIED SOLUTIONS GRADED A+ (All)
• Question 1 2 out of 2 points The domain connects an organizations private network to the Internet? Selected Answer: LAN-to- WAN • Question 2 0 out ... of 2 points To promote cultural change, the goal should be to make security policies ? Selected Answer: Be reviewed every two years • Question 3 2 out of 2 points Without sponsorship, users will be less likely to eagerly participate in awareness training. Selected Answer: Executive management • Question 4 2 out of 2 points What needs do organizations have to classify data? Selected Answer: To protect and recover information • Question 5 The Security Compliance Committee ? 2 out of 2 points Selected Answer: Approves controls for compliance • Question 6 Web Services policies would be an example of domain. 2 out of 2 points Selected WA Answer: N • Question 7 2 out of 2 points Production data should be before being used in a test environment? Selected Answer: Sanitiz ed • Question 8 2 out of 2 points Which of the following includes guidelines under the LAN domain policies? Selected Answer: IDS and IPS architecture and management • Question 9 Which of the following is a common cause of security breaches? 2 out of 2 points Selected Answer: Inadequate management and user decisions • Question 10 What is a strong indicator that awareness training is not effective? 2 out of 2 points Selected Answer: Sharing your password with a supervisor • Question 11 Baseline standards for the LAN domain would include . 2 out of 2 points Selected Answer: Wi-Fi access points • Question 12 2 out of 2 points Which of the following is not an organizational challenge when implementing security policies? Selected Answer: Fiscal surplus • Question 13 2 out of 2 points The model was the first model developed to address the concerns of integrity. Originally published in 1977 Selected Answer: Bib a • Question 14 2 out of 2 points occurs when you manipulate or trick a person into weakening the security of an organization? Selected Answer: Social engineering • Question 15 2 out of 2 points Data in transit refers to what type of data? Selected Answer: Data traversing a network • Question 16 2 out of 2 points Simple security policy awareness requires that report suspicious activity? Selected Answer: All of the above • Question 17 2 out of 2 points A business impact analysis requires an impact report, component reliance, and a . Selected Answer: component priority • Question 18 2 out of 2 points techniques can provide a security baseline for full operating systems and applications? Selected Answer: Imagin g • Question 19 2 out of 2 points A standard describes the requirements for obtaining a domain name for use by external parties? Selected Answer: DNS control • Question 20 2 out of 2 points A(n) has an easier time bypassing security controls and hiding his or her tracks by deleting or altering logs and time stamps. Selected Answer: Inside r • Question 21 2 out of 2 points typically have the technical skills to make critical recommendation on how to stop an attack. Selected Answer: Information technology subject matter experts • Question 22 2 out of 2 points Why should a security policy implementation be flexible to allow for updates? Selected Answer: B and C only • Question 23 2 out of 2 points Two-factor authentication is a typical control used by employees to remotely access which of the following? Selected LA Answer: N • Question 24 2 out of 2 points It is necessary to retain data for what major reasons? Selected Answer: Legal obligation and needs of the business • Question 25 0 out of 2 points A is the first step in building a business continuity plan (BCP) to minimize losses. Selected Answer: Control framework • Question 26 2 out of 2 points Security policy enforcement can include ? Selected Answer: Access control • Question 27 [Show More]
Last updated: 2 years ago
Preview 1 out of 9 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Nov 24, 2021
Number of pages
9
Written in
This document has been written for:
Uploaded
Nov 24, 2021
Downloads
0
Views
183
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·