Exam 11: Wireless Security Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is a collection of suggestions that should be implemented.

(Multiple Choice)
4.8/5
(37)

What are the characteristics of a policy?

(Essay)
4.9/5
(36)

A(n) ____________________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.

(Short Answer)
4.7/5
(39)

Identifying assets is a fairly simple and quick process.

(True/False)
4.8/5
(30)

A(n) ____ is defined as any item that has a positive economic value.

(Multiple Choice)
4.8/5
(41)

What are some of the factors to consider when determining the relative value of an asset?

(Essay)
4.9/5
(35)

A(n) ____ provides a visual image of the attacks that may occur against an asset.

(Multiple Choice)
4.9/5
(36)

____ seeks to determine the risks that an organization faces against its information assets.

(Multiple Choice)
4.9/5
(26)

A(n) ____ outlines the actions to be performed when a security breach occurs.

(Multiple Choice)
4.8/5
(26)

The ____ is the expected monetary loss that can be expected for an asset because of a risk over a one-year period.

(Multiple Choice)
4.9/5
(41)

Managing the process of implementing changes is known as ____.

(Multiple Choice)
4.9/5
(45)

Only that employee whose job function depends on knowing the information is provided access. This is called ____.

(Multiple Choice)
4.8/5
(44)

____________________ means that one person's work serves as a complementary check on another person's actions.

(Short Answer)
4.8/5
(28)

Briefly explain how to perform a risk assessment.

(Essay)
4.9/5
(35)

____ takes a current snapshot of the security of the organization as it now stands.

(Multiple Choice)
4.8/5
(26)

____ constructs scenarios of the types of threats that assets can face.

(Multiple Choice)
4.8/5
(39)

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

(Multiple Choice)
4.8/5
(32)

A(n) ____ policy should clearly address how passwords are managed.

(Multiple Choice)
4.8/5
(40)

The goal of information security is to protect the integrity, ____, and availability of data on the devices that store, manipulate, and transmit the information.

(Multiple Choice)
4.7/5
(42)

What are the types of assets available at any organization?

(Essay)
5.0/5
(39)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)