Thursday, March 7, 2019
FINAL EXAM: Study Guide Essay
1. Which of the sp be-time activity is an activeness that could damage an asset?2. Which law requires all graphemes of financial institutions to protect customers nonpublic financial information?3. An AUP is part of a layered approach to auspices, and it supports confidentiality. What else supports confidentiality?4. Which of the interest is a detailed written definition of how softw be and hardware are to be used?5. Which of the pursual(a) is not a common character of data classification standard?6. What does a lapse in a security control or policy create?7. Which of the pastime is some(prenominal) weakness in a system that makes it possible for a flagellum to cause it harm?8. Which of the following terms refers to the likelihood of exposure to endangerment?9. Which type of attacker intends to be helpful?10. Which domain is primarily moved(p) by weak endpoint security on a VPN client?11. find two phases of the access control process.12. You log onto a mesh topology a nd are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics.This is an example of which of the following?13. Which of the following is a type of authentication?14. cite an example of an access control formal model.15. Which of the following access control models is based on a mathematical surmisal published in 1989 to ensure fair competition?16. Which of the following are master(a) categories of rules that most organizations must comply with?17. Which of the following is not a part of an ordinary IT security policy framework?18. Which of the following helps you ascertain the appropriate access to classified data?19. Which of the following refers to the commission of service line settings for a system device?20. Identify a native timber of the SDLC.21. Which of the following is a process to verify policy deference?22. When supervise a system for anomalies, the system is measured against _.23. Which of the following is not a type of penetration test?24. Identify a drawback of log monitoring.25. Which of the following is not a type of monitoring device?26. Identify the primary components of risk focussing.27. Which of the following is not a part of a decimal risk assessment?28. What are the primary components of business continuity management (BCM)?29. Which of the following determines the extent of the impact that a particular incident would fetch on business operations over time?30. What does risk management directly affect?31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A?32. Identify a security intention that adds value to a business.33. Which of the following is an unsymmetric encryption algorithm?34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature.35. Which of the following is a mechanism for accomplishing confidentiality, integ rity, authentication, and nonrepudiation?36. In which OSI layer do you find FTP, HTTP, and another(prenominal) programs that end users interact with?37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives.38. Which of the following would you not predict to find on a large network?39. Which of the following is a weakness of WLANs?40. Identify an advantage of IPv6 over IPv4.41. Identify one of the head start computer viruses to appear in the world.42. Which of the following is not a primary type of computer attack?43. How do worms propagate to other systems?44. Which of the following type of program is also commonly referred to as a fifth column horse?45. Which defense-in-depth layer involves the use of chokepoints?46. How does a standard differ from a compliance law?47. Which of the following is not a principle of the PCI DSS?48. Identify the complian ce law that requires adherence to the minimum necessary rule.49. Identify the compliance law whose primary goal is to protect investors from fi nancial fraud. 50. U.S. organizations must comply with
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.