Computer Networking > QUESTIONS & ANSWERS > LIBERTY UNIVERSITY CSIS 340 Final Exam 1 QUESTIONS WITH ALL VERIFIED SOLUTIONS GRADED A+ (All)

LIBERTY UNIVERSITY CSIS 340 Final Exam 1 QUESTIONS WITH ALL VERIFIED SOLUTIONS GRADED A+

Document Content and Description Below

• Question 1 2 out of 2 points The domain connects an organizations private network to the Internet? Selected Answer: LAN-to- WAN • Question 2 0 out ... of 2 points To promote cultural change, the goal should be to make security policies ? Selected Answer: Be reviewed every two years • Question 3 2 out of 2 points Without sponsorship, users will be less likely to eagerly participate in awareness training. Selected Answer: Executive management • Question 4 2 out of 2 points What needs do organizations have to classify data? Selected Answer: To protect and recover information • Question 5 The Security Compliance Committee ? 2 out of 2 points Selected Answer: Approves controls for compliance • Question 6 Web Services policies would be an example of domain. 2 out of 2 points Selected WA Answer: N • Question 7 2 out of 2 points Production data should be before being used in a test environment? Selected Answer: Sanitiz ed • Question 8 2 out of 2 points Which of the following includes guidelines under the LAN domain policies? Selected Answer: IDS and IPS architecture and management • Question 9 Which of the following is a common cause of security breaches? 2 out of 2 points Selected Answer: Inadequate management and user decisions • Question 10 What is a strong indicator that awareness training is not effective? 2 out of 2 points Selected Answer: Sharing your password with a supervisor • Question 11 Baseline standards for the LAN domain would include . 2 out of 2 points Selected Answer: Wi-Fi access points • Question 12 2 out of 2 points Which of the following is not an organizational challenge when implementing security policies? Selected Answer: Fiscal surplus • Question 13 2 out of 2 points The model was the first model developed to address the concerns of integrity. Originally published in 1977 Selected Answer: Bib a • Question 14 2 out of 2 points occurs when you manipulate or trick a person into weakening the security of an organization? Selected Answer: Social engineering • Question 15 2 out of 2 points Data in transit refers to what type of data? Selected Answer: Data traversing a network • Question 16 2 out of 2 points Simple security policy awareness requires that report suspicious activity? Selected Answer: All of the above • Question 17 2 out of 2 points A business impact analysis requires an impact report, component reliance, and a . Selected Answer: component priority • Question 18 2 out of 2 points techniques can provide a security baseline for full operating systems and applications? Selected Answer: Imagin g • Question 19 2 out of 2 points A standard describes the requirements for obtaining a domain name for use by external parties? Selected Answer: DNS control • Question 20 2 out of 2 points A(n) has an easier time bypassing security controls and hiding his or her tracks by deleting or altering logs and time stamps. Selected Answer: Inside r • Question 21 2 out of 2 points typically have the technical skills to make critical recommendation on how to stop an attack. Selected Answer: Information technology subject matter experts • Question 22 2 out of 2 points Why should a security policy implementation be flexible to allow for updates? Selected Answer: B and C only • Question 23 2 out of 2 points Two-factor authentication is a typical control used by employees to remotely access which of the following? Selected LA Answer: N • Question 24 2 out of 2 points It is necessary to retain data for what major reasons? Selected Answer: Legal obligation and needs of the business • Question 25 0 out of 2 points A is the first step in building a business continuity plan (BCP) to minimize losses. Selected Answer: Control framework • Question 26 2 out of 2 points Security policy enforcement can include ? Selected Answer: Access control • Question 27 [Show More]

Last updated: 2 years ago

Preview 1 out of 9 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$14.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

183
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 24, 2021

Number of pages

9

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

620 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Nov 24, 2021

Downloads

 0

Views

 183

Document Keyword Tags


$14.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·