Exam 14: Risk Mitigation
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
A ____ is a collection of suggestions that should be implemented.
(Multiple Choice)
4.9/5
(29)
When designing a security policy, many organizations follow a standard set of ____________________.
(Short Answer)
4.7/5
(29)
A due process policy is a policy that defines the actions users may perform while accessing systems and networking equipment.
(True/False)
5.0/5
(38)
Most people are taught using a(n) ____________________ approach.
(Short Answer)
4.7/5
(38)
Which roles should be represented on the security policy development team?
(Essay)
5.0/5
(38)
List four attributes that should be compiled for new equipment in the change management documentation.
(Essay)
4.7/5
(42)
What are the typical classification designations of government documents?
(Essay)
4.8/5
(33)
A(n) ____ policy outlines how the organization uses personal information it collects.
(Multiple Choice)
4.8/5
(40)
____ networks are typically used for connecting devices on an ad hoc basis for file sharing of audio, video, and data, or real-time data transmission such as telephony traffic.
(Multiple Choice)
4.9/5
(33)
____ are generally considered to be the most important information security policies.
(Multiple Choice)
4.8/5
(34)
Most organizations follow a three-phase cycle in the development and maintenance of a security policy.
(True/False)
4.8/5
(30)
A(n) ____________________ is a collection of requirements specific to the system or procedure that must be met by everyone.
(Short Answer)
4.8/5
(44)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(42)
A(n) ____ policy is designed to produce a standardized framework for classifying information assets.
(Multiple Choice)
4.9/5
(26)
____ is the planning, coordination, communications, and planning functions that are needed in order to resolve an incident in an efficient manner.
(Multiple Choice)
4.8/5
(26)
At the heart of information security is the concept of ____.
(Multiple Choice)
4.9/5
(28)
____ learners learn through taking notes, being at the front of the class, and watching presentations.
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)