CCNA 4 CH8

CCNA 4 CH8

University

19 Qs

quiz-placeholder

Similar activities

Art Appreciation - Art Movements

Art Appreciation - Art Movements

University

15 Qs

BANKING- UNIT V

BANKING- UNIT V

University - Professional Development

15 Qs

CCNA CH6

CCNA CH6

University

17 Qs

Value Elements of Art (LBtL)

Value Elements of Art (LBtL)

6th Grade - University

15 Qs

Visual VS. Performing

Visual VS. Performing

University

15 Qs

MUS 108 Review Quiz 2/14/24

MUS 108 Review Quiz 2/14/24

University

15 Qs

Art Appreciation

Art Appreciation

University

15 Qs

Art Class Feedback

Art Class Feedback

8th Grade - University

14 Qs

CCNA 4 CH8

CCNA 4 CH8

Assessment

Quiz

Arts

University

Medium

Created by

KEN ROLLOQUE

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

If a person knowingly accesses a government computer without permission, what federal act laws would the person be subject to?
SOX
ECPA
CFAA
GLBA

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Unauthorized visitors have entered a company office and are walking around the building. What two measures can be implemented to prevent unauthorized visitor access to the building? (Choose two.)
Lock cabinets.
Conduct security awareness training regularly.
Prohibit exiting the building during working hours.
Establish policies and procedures for guests visiting the building.

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

An auditor is asked to assess the LAN of a company for potential threats. What are three potential threats the auditor may point out? (Choose three.)
unlocked access to network equipment
a misconfigured firewall
the acceptable use policy
unauthorized port scanning and network probing
complex passwords

4.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

A company has had several incidents involving users downloading unauthorized software, using unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to manage the user threats. What three things might be put in place to manage the threats? (Choose three.)
Provide security awareness training.
Disable CD and USB access.
Implement disciplinary action.
Monitor all activity by the users.
Use content filtering.

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

As part of HR policy in a company, an individual may opt-out of having information shared with any third party other than the employer. Which law protects the privacy of personal shared information?
PCI
FIRPA
SOX
GLBA

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

 What can be used to rate threats by an impact score to emphasize important vulnerabilities?
ACSC
ISC
NVD
CERT

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?
SOX
ECPA
GLBA
PCI DSS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?