Chapter 11:   Security Maintenance

Chapter 11: Security Maintenance

Professional Development

20 Qs

quiz-placeholder

Similar activities

Java Basics

Java Basics

Professional Development

17 Qs

Machine Learning 101

Machine Learning 101

University - Professional Development

20 Qs

Application/Service Attacks

Application/Service Attacks

KG - Professional Development

18 Qs

LaTeX Workshop Quiz

LaTeX Workshop Quiz

Professional Development

16 Qs

Python 2

Python 2

Professional Development

15 Qs

Health and Safety

Health and Safety

Professional Development

20 Qs

Chapter 1 and 2 Quiz

Chapter 1 and 2 Quiz

Professional Development

20 Qs

JavaScript Essentials Quiz

JavaScript Essentials Quiz

Professional Development

16 Qs

Chapter 11:   Security Maintenance

Chapter 11: Security Maintenance

Assessment

Quiz

Computers

Professional Development

Hard

Created by

LEVIANA ANDREW

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital forensics helps an organization understand what happened, and how, after an incident.

True

False

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An effective information security governance program requires no ongoing review one it is well-established.

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

External monitoring entails collecting intelligence from various data sources and then giving that intelligence context and meaning for use by decision makers within the organization.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

US-CERT is generally viewed as the definitive authority for computer emergency response teams.

True

False

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Intelligence for external monitoring can come from a number of sources: vendors, CERT organizations, public network sources, and membership sites.

True

False

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The internal monitoring domain is the component of the maintenance model that focuses on identifying, assessing, and managing the physical security of assets in an organization.

True

False

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality and should be highly accurate and updated each time there is a change.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?