CYB125 - Ch9

CYB125 - Ch9

University

39 Qs

quiz-placeholder

Similar activities

Quiz Informatika Kelas X SMA

Quiz Informatika Kelas X SMA

10th Grade - University

40 Qs

UTS 3D Animasi

UTS 3D Animasi

11th Grade - University

35 Qs

SH Sistem Komputer 6

SH Sistem Komputer 6

6th Grade - University

40 Qs

Linux File Permissions / commands Basic Quiz

Linux File Permissions / commands Basic Quiz

10th Grade - University

36 Qs

Creación de Bases de Datos

Creación de Bases de Datos

University

43 Qs

CSS 3rd Quarter Examination

CSS 3rd Quarter Examination

11th Grade - University

40 Qs

HPC 202/ TPC 202- Quiz # 1

HPC 202/ TPC 202- Quiz # 1

University

40 Qs

IST 166 Module 1

IST 166 Module 1

University

39 Qs

CYB125 - Ch9

CYB125 - Ch9

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Anonymous Anonymous

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?

Adherence to policy

Ownership

Privacy

Risk

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

Higher degree of privacy

Access to a higher level of expertise

Developing in-house talent

Building internal knowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?

Certification

Event logs

Professional ethics

Remediation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Service-level agreement (SLA)

Blanket purchase agreement (BPA)

Memorandum of understanding (MOU)

Interconnection security agreement (ISA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?

Encouraging the adoption of ethical guidelines and standards

Informing users through security awareness training

Communicating the freedom to access all system resources

Understanding common assumptions that lead computer users to unethical behavior

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?

Job rotation

Limiting access

Mandatory vacations

Separation of duties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not a privacy principle created by the Organisation for Economic Co-operation and Development (OECD)?

An organization should collect only what it needs.

An organization should share its information.

An organization should keep its information up to date.

An organization should properly destroy its information when it is no longer needed.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?