Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?

CYB125 - Ch9

Quiz
•
Information Technology (IT)
•
University
•
Hard

Damon Vogel
FREE Resource
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Adherence to policy
Ownership
Privacy
Risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Higher degree of privacy
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?
Certification
Event logs
Professional ethics
Remediation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
Service-level agreement (SLA)
Blanket purchase agreement (BPA)
Memorandum of understanding (MOU)
Interconnection security agreement (ISA)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?
Encouraging the adoption of ethical guidelines and standards
Informing users through security awareness training
Communicating the freedom to access all system resources
Understanding common assumptions that lead computer users to unethical behavior
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?
Job rotation
Limiting access
Mandatory vacations
Separation of duties
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?
An organization should collect only what it needs.
An organization should share its information.
An organization should keep its information up to date.
An organization should properly destroy its information when it is no longer needed.
Create a free account and access millions of resources
Similar Resources on Quizizz
43 questions
MGMT 2080 - Exam 2

Quiz
•
University
37 questions
ITE 292 P3 Exam

Quiz
•
University
39 questions
itn 200 part 1

Quiz
•
University
41 questions
CYB125 - Ch1

Quiz
•
University
35 questions
SPECIAL EXAMINATION - TM104

Quiz
•
University
38 questions
Quiz sur Apollo GraphQL

Quiz
•
University
39 questions
CYB125 - Ch8

Quiz
•
University
35 questions
CS ProjMan - FA3

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade