Chapter 9 Quiz

Chapter 9 Quiz

Professional Development

23 Qs

quiz-placeholder

Similar activities

Chapter 7

Chapter 7

Professional Development

20 Qs

Assesment Quiz

Assesment Quiz

Professional Development

25 Qs

Chapter 3 Quiz

Chapter 3 Quiz

Professional Development

20 Qs

Chapter 6 Quiz

Chapter 6 Quiz

Professional Development

20 Qs

Cloud Computing_3

Cloud Computing_3

Professional Development

20 Qs

Cyber 1 Chapter 9: Network Basics

Cyber 1 Chapter 9: Network Basics

9th Grade - Professional Development

18 Qs

Enterprise Mobility + Security

Enterprise Mobility + Security

Professional Development

24 Qs

Linux Managing Systems

Linux Managing Systems

Professional Development

20 Qs

Chapter 9 Quiz

Chapter 9 Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Lauren Gutierrez

Used 4+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

True or False? Procedures help enforce the intent of a policy.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

True or False? Configuration changes can be made at any time during a system life cycle, and no process is required.

True

False

Answer explanation

It is important that all configuration changes occur only within a controlled process. Uncontrolled configuration changes often result in conflicts and even new security vulnerabilities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these types of classification decisions?

Value

Criticality

Threat

Sensitivity

Answer explanation

The three criteria normally used to make classification decisions are value, sensitivity, and criticality.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

True or False? The Common Criteria is a set of system procurement standards used by several countries.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

Access to a higher level of expertise

Developing in-house talent

Building internal knowledge

Higher degree of privacy

Answer explanation

In this scenario, Mark is most likely to achieve access to a high level of expertise because security vendors focus exclusively on providing advanced security services.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

True or False? The idea that users should be granted only the levels of permissions they need to perform their duties is called the principle of least privilege.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the correct order of change control procedures regarding changes to systems and networks?

Request, approval, impact assessment, build/test, monitor, implement

Request, approval, impact assessment, build/test, implement, monitor

Request, impact assessment, approval, build/test, monitor, implement

Request, impact assessment, approval, build/test, implement, monitor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?