Chapter4_SecurityPlanning

Chapter4_SecurityPlanning

University

15 Qs

quiz-placeholder

Similar activities

Seguridad RLS en Postgrest

Seguridad RLS en Postgrest

University

15 Qs

 MCQs on IT Security Risk Management

MCQs on IT Security Risk Management

University

19 Qs

QUIZ 1-IKI

QUIZ 1-IKI

University

12 Qs

Formative 6 - Software Quality

Formative 6 - Software Quality

University

10 Qs

Quiz2 on Dental Informatics

Quiz2 on Dental Informatics

University

10 Qs

Huawei Security

Huawei Security

University

15 Qs

Network Security Quiz 3CS2 01

Network Security Quiz 3CS2 01

University

15 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Chapter4_SecurityPlanning

Chapter4_SecurityPlanning

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

MON MALBOG

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of an information security program?

To develop a marketing strategy

To establish policies, standards, and practices

To hire more employees

To create a budget for security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of contingency planning?

Business continuity plans

Disaster recovery planning

Incident response planning

Employee training programs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must security policies do to be effective?

Be properly disseminated and understood

Be ignored by employees

Be expensive to implement

Be written in legal jargon

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of standards are formal standards classified as?

De jure standards

Informal standards

De facto standards

Operational standards

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a policy administrator?

To enforce laws

To conduct security audits

To draft all security policies

To manage policy effectiveness

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key technology component that monitors network traffic?

Intrusion Detection System (IDS)

Proxy Server

Cache Server

Firewall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a clean desk policy require?

No personal items on desks

All documents to be shredded

Classified information to be stored securely

Employees to work from home

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?