Search Header Logo

1-course, 3-part(18q)

Authored by Nurly Nurly

Other

12th Grade

Used 3+ times

1-course, 3-part(18q)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once the organization has defined the policies that will guide its security program, the next step is to implement a program known as _____ that is designed to prepare employees to comply with the policy.

SETA

STEA

SecPol

ETAS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _____ a recommendation the user may use to help comply with a policy.

standard

procedure

ruleset

guideline

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that attempts to overwhelm a computer target's ability to handle incoming communications is known as _____.

denial of service

a virus

a worm

spam

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _____ is a set of examples used to illustrate compliance with policy.

practice

standard

guideline

recomendation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual or group that creates or is responsible for a set of information is/are the _____.

data owners

data trustees

data custodians

data users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The longer the time between vulnerability assesments, _____.

the more likely new vulnerabilities can be exploited

the lower the chance older vulberablites will be used

the more you increase costs for testing

the easier it is to lower your risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The category of threat that represents a situation where we mst rely on technology that cannot be easily replaced is known as _____.

technical hardware failure

mean time until failure

technological obsolesence

technical software failure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?