EA Program Security and Privacy Quiz 2

EA Program Security and Privacy Quiz 2

University

15 Qs

quiz-placeholder

Similar activities

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Planning and Implementation of Information Security

Planning and Implementation of Information Security

University

10 Qs

Access to the Cloud

Access to the Cloud

University

15 Qs

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

EA Program Security and Privacy Quiz

EA Program Security and Privacy Quiz

University

10 Qs

QUIZ 3- BAEN/ITED

QUIZ 3- BAEN/ITED

University

10 Qs

Cloud Architecting - Week 9

Cloud Architecting - Week 9

University

20 Qs

EA Program Security and Privacy Quiz 2

EA Program Security and Privacy Quiz 2

Assessment

Quiz

Computers

University

Hard

Created by

Marygrace Contillo

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to include IT security in an EA program and the documentation of EA components?

To increase the cost of the enterprise

To complicate the operational processes

To ensure the protection of IT resources and information

To slow down the technological advancements

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the basic areas of an Security and Privacy Program?

Financial Security, Legal Security, Data Security, Network Security

Information Security, Personnel Security, Operational Security, Physical Security

Software Security, Hardware Security, Cloud Security, Mobile Security

Social Security, Health Security, Environmental Security, Educational Security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Physical Security issues that should be reflected in the IT Security Plan?

Software Security, Hardware Security, Cloud Security, Mobile Security

Network Operation Centers, Server Rooms, Wiring Closets, Cable Plants

Building Security, Cable Plants, Software Security, Network Security

Building Security, Network Operation Centers, Server Rooms, Wiring Closets

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Personnel Security issues that should be reflected in the IT Security Plan?

Building Security, Network Operation Centers, Server Rooms, Wiring Closets

User Authentication, Awareness Training, Procedures Training

Design, Assurance, Authentication, Access

Risk Assessment, Testing and Evaluation, Vulnerability Remediation, Disaster Recovery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Information Security issues that should be reflected in the IT Security Plan?

Building Security, Network Operation Centers, Server Rooms, Wiring Closets

Risk Assessment, Testing and Evaluation, Vulnerability Remediation, Disaster Recovery

Design, Assurance, Authentication, Access

User Authentication, Awareness Training, Procedures Training

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Operational Security issues that should be reflected in the IT Security Plan?

User Authentication, Awareness Training, Procedures Training

Design, Assurance, Authentication, Access

Standard Operating Procedures, Component Security Testing and Evaluation, Vulnerability Remediation

Risk Assessment, Testing and Evaluation, Vulnerability Remediation, Disaster Recovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are there no 100 percent fool-proof IT Security solutions?

Because IT security is too expensive

Because IT security is not important

Because IT components are designed and managed by humans

Because IT security is not effective

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?