Exam 14: Risk Mitigation
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong.
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
A
Contrast the difference between a pedagogical approach versus an andragogical approach to subject matter.
Free
(Essay)
4.8/5
(34)
Correct Answer:
In a pedagogical approach, the subject matter is defined by what the teacher wants to give. In an andragogical approach, learning is organized around situations in life or at work.
A ____ is a document that outlines specific requirements or rules that must be met.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
D
____ may be defined as the components required to identify, analyze, and contain that incident.
(Multiple Choice)
4.9/5
(39)
____________________ seeks to approach changes systematically and provide the necessary documentation of the changes.
(Short Answer)
4.7/5
(32)
____ learners tend to sit in the middle of the class and learn best through lectures and discussions.
(Multiple Choice)
4.8/5
(36)
A policy that addresses security as it relates to human resources is known as a(n) ____ policy.
(Multiple Choice)
4.8/5
(37)
____ can be defined as the study of what a group of people understand to be good and right behavior and how people make those judgments.
(Multiple Choice)
4.7/5
(41)
Because the impact of changes can potentially affect all users, and uncoordinated changes can result in security vulnerabilities, many organizations create a(n) ____ to oversee the changes.
(Multiple Choice)
4.9/5
(42)
____ can be defined as the "framework" and functions required to enable incident response and incident handling within an organization.
(Multiple Choice)
4.9/5
(39)
A(n) ____________________ is a methodical examination and review that produces a detailed report of its findings.
(Short Answer)
4.8/5
(33)
The Web sites that facilitate linking individuals with common interests like hobbies, religion, politics, or school contacts are called ____ sites.
(Multiple Choice)
4.7/5
(28)
List one reason why social networking sites are popular with attackers.
(Essay)
4.7/5
(37)
The objective of incident response is to restore normal operations as quickly as possible with the least possible impact on either the business or the users.
(True/False)
4.8/5
(36)
____ are a person's fundamental beliefs and principles used to define what is good, right, and just.
(Multiple Choice)
4.9/5
(28)
____ learners learn through a lab environment or other hands-on approaches.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)