Exam 11: Wireless Security Policy
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
The risks for the least important assets should be reduced first.
Free
(True/False)
4.7/5
(35)
Correct Answer:
False
____ is the process of tracking the assets.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
The proper development of a security policy is accomplished through what is called the ____.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
D
A ____ is a document that outlines specific requirements or rules that must be met.
(Multiple Choice)
4.8/5
(36)
The ALE is calculated by multiplying the SLE by the ____________________.
(Short Answer)
4.9/5
(34)
The ____ is the expected monetary loss every time a risk occurs.
(Multiple Choice)
4.8/5
(36)
If policies are too restrictive or too hard to implement and comply with, they will either be ignored or people will find a way to circumvent the controls in the policies.
(True/False)
4.8/5
(42)
The main purpose of an ethics code is to state the values, principles, and ideals that each member of an organization must agree to.
(True/False)
4.7/5
(43)
What are the options faced by an organization when confronted with a risk?
(Essay)
4.9/5
(39)
What are some of the principles that are involved for good compliance monitoring and evaluation?
(Essay)
4.9/5
(30)
Why is it critical to have users "buy in" to the policy and willingly follow it?
(Essay)
4.8/5
(35)
____ is defined as the obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them.
(Multiple Choice)
4.9/5
(43)
A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.
(Multiple Choice)
4.9/5
(37)
Briefly describe the areas that should be considered when creating an incident response team (IRT).
(Essay)
4.9/5
(34)
Many organizations now enforce a(n) ____ policy to address accessing public hotspots.
(Multiple Choice)
4.8/5
(28)
The SLE is computed by multiplying the value of the asset (Asset Value or AV) by the ____________________.
(Short Answer)
4.9/5
(40)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(39)
The best approach to creating a security policy is for a member of the IT staff to create the document in a few days with little or no input from other individuals.
(True/False)
4.9/5
(37)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)