Computer Science > EXAM > CSIS 340 Final Exam 1 QUESTIONS WITH ALL VERIFIED SOLUTIONS GRADED A+ (All)

CSIS 340 Final Exam 1 QUESTIONS WITH ALL VERIFIED SOLUTIONS GRADED A+

Document Content and Description Below

1. The _____ domain connects an organizations private network to the Internet? 2. To promote cultural change, the goal should be to make security policies _____? 3. Without _____ sponsorship, users wi... ll be less likely to eagerly participate in awareness training. 4. What needs do organizations have to classify data? 5. The Security Compliance Committee _____? 6. Web Services policies would be an example of _____ domain. 7. Production data should be _____ before being used in a test environment? 8. Which of the following includes guidelines under the LAN domain policies? 9. Which of the following is a common cause of security breaches? 10. What is a strong indicator that awareness training is not effective? 11. Baseline standards for the LAN domain would include _____. 12. Which of the following is not an organizational challenge when implementing security policies? 13. The ______________ model was the first model developed to address the concerns of integrity. Originally published in 1977 14. _____ occurs when you manipulate or trick a person into weakening the security of an organization? 15. Data in transit refers to what type of data? 16. Simple security policy awareness requires that _____ report suspicious activity? 17. A business impact analysis requires an impact report, component reliance, and a _____. 18. _____ techniques can provide a security baseline for full operating systems and applications? 19. A _____ standard describes the requirements for obtaining a domain name for use by external parties? 20. A(n) _____ has an easier time bypassing security controls and hiding his or her tracks by deleting or altering logs and time stamps. 21. _____ typically have the technical skills to make critical recommendation on how to stop an attack. 22. Why should a security policy implementation be flexible to allow for updates? 23. Two-factor authentication is a typical control used by employees to remotely access which of the following? 24. It is necessary to retain data for what major reasons? 25. A _____ is the first step in building a business continuity plan (BCP) to minimize losses. 26. Security policy enforcement can include _____? 27. _____ protects data at rest from all type of breaches. 28. Once security policies are established, line management must _____ ? 29. Outdated application controls place a greater reliance on _____? 30. The following documents help capture domain security control requirements? 31. The ________________ model uses mandatory access control to enforce the DoD multilevel security policy. 32. Generally, an Acceptable Use Policy should outline _____? 33. A _____ is a specialized group of people whose purpose is to respond to major incidents. 34. Which of the following should be in an information response team charter? 35. A(n) ______ ensures workers are conscious of security risks and how to deal with unexpected risk. 36. Without a policy that leads to controls that restrict employees from installing their own software on a company workstation, a company could suffer which of the following consequences? 37. Good reasons to monitor worker’s computer activities are when ______? 38. A _____ is a common control that is used across a significant population of systems? 39. Employer response to an employee posting company passwords on their social network site should include _____? 40. Security experts consider _____ the weakest link in security. 41. A malicious _____ attack uses viruses, worms, Trojan horses, and scripts to gain access to systems, applications, and data. 42. You can use a _____ process to grant temporary elevated rights. 43. The following organization has offered reliable security policies in the past to help organizations develop proper infrastructure policies. 44. _____ are especially useful for identifying unauthorized changes. 45. The Risk Management Continuous Improvement Model includes _____? 46. The signs of an incident can be _____? 47. _____ determines how quickly a business process should be recovered. 48. A privileged-level access agreement (PAA) is designed to heighten the awareness and accountability of? 49. ______ software is capable of capturing usernames, passwords, and websites visited on a local workstation? 50. A _____ can identify hosts on a network and determine services running on the hosts. [Show More]

Last updated: 2 years ago

Preview 1 out of 9 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$20.50

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

126
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 12, 2021

Number of pages

9

Written in

Seller


seller-icon
Rixx

Member since 4 years

843 Documents Sold

Reviews Received
136
20
21
11
37
Additional information

This document has been written for:

Uploaded

Mar 12, 2021

Downloads

 0

Views

 126

Document Keyword Tags

Recommended For You

Get more on EXAM »

$20.50
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·