Search Header Logo

EA Program Security and Privacy Quiz

Authored by Marygrace Contillo

Computers

University

Used 4+ times

EA Program Security and Privacy Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is it important to include IT security in an EA program and the documentation of EA components?

To slow down the enterprise's strategic initiatives

To ensure foolproof security solutions

To increase the cost of implementing EA components

To protect IT resources from unauthorized access and use

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are the basic areas of an Security and Privacy Program?

Financial Security, Customer Security, Data Security, Network Security

Social Security, Health Security, Environmental Security, Political Security

Information Security, Personnel Security, Operational Security, Physical Security

Software Security, Hardware Security, Cloud Security, Mobile Security

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are the Physical Security issues that should be reflected in the IT Security Plan?

Network Security, Personnel Security, Information Security, Operations Security

Building Security, Cable Plants, Software Security, Data Centers

Hardware Security, Access Control, Disaster Recovery, Biometric Scans

Building Security, Network Operation Centers, Cable Plants, Server Rooms

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are the Personnel Security issues that should be reflected in the IT Security Plan?

User Authentication, Awareness Training, Procedures Training

Building Security, Network Operation Centers, Cable Plants, Server Rooms

Risk Assessment, Testing and Evaluation, Vulnerability Remediation

Disaster Recovery, Continuity of Operations, Standard Operating Procedures

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are the Information Security issues that should be reflected in the IT Security Plan?

Building Security, Cable Plants, Software Security, Data Centers

Design, Assurance, Authentication, Access

Risk Assessment, Testing and Evaluation, Vulnerability Remediation

Disaster Recovery, Continuity of Operations, Standard Operating Procedures

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What are the Operational Security issues that should be reflected in the IT Security Plan?

User Authentication, Awareness Training, Procedures Training

Component Certification and Accreditation, Standard Operating Procedures, Disaster Recovery

Building Security, Network Operation Centers, Cable Plants, Server Rooms

Risk Assessment, Testing and Evaluation, Vulnerability Remediation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why are there no 100 percent fool-proof IT Security solutions?

Because IT security is too expensive to implement

Because IT security is not important

Because IT security is always perfect

Because insider threats can compromise security solutions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?