Exam 6: Management
Exam 1: Assessment7 Questions
Exam 2: Assets9 Questions
Exam 3: Communication39 Questions
Exam 4: Engineering69 Questions
Exam 5: ID and Access17 Questions
Exam 6: Management51 Questions
Exam 7: Operations85 Questions
Exam 8: Software22 Questions
Select questions type
Copyright law protects the right of authors to control their work. What does trademark protect?
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
D
You have been assigned to deal with the company's risk issues to protect again total risk and residual risk. What approach can you use?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
D
Jeff is informing Mark that he believes there has been a security breach and wants things checked. Mark checks all security systems within the computer, completes an access audit, and checks exterior security devices, although he knows that his company has installed every security option possible. What is Mark practicing?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
C
What type of policy presents management's decisions that are more specific to the actual computers, networks, applications, and data?
(Multiple Choice)
4.9/5
(34)
Paul is talking to his employees about threat agents. What item is not a threat agent?
(Multiple Choice)
4.9/5
(32)
The functionality and effectiveness of countermeasures is as important as determining the type of risk by completing quantitative and qualitative analysis. What risk can prove to be the most detrimental to a company long after the original risk event?
(Multiple Choice)
4.9/5
(34)
Ron is an executive who is being sued by an ex-employee. He is not worried, for he knows he has done everything within the regulation guidelines and has acted ethically. Who wrote the guidelines that Ron has followed?
(Multiple Choice)
4.9/5
(39)
Lulu took medicine created by XYZ Pharmaceutical that damaged her liver. Now they are being sued. What type of law will this trial be held under?
(Multiple Choice)
4.8/5
(32)
What order should these steps be completed in when conducting a Business Impact Analysis (BIA)?
(Multiple Choice)
4.8/5
(33)
What Act requires U.S. federal agencies to identify computer systems that contain sensitive information?
(Multiple Choice)
4.9/5
(36)
What value tells a company how much should sensibly be spent per year on safeguard measures to protect assets from threats?
(Multiple Choice)
4.9/5
(42)
What is the name for the primary U.S. federal antihacking statue?
(Multiple Choice)
4.8/5
(31)
Paul has just completed identifying and assessing risk, reduced it to an acceptable level, and implemented the right mechanisms to maintain that level. What did Paul just do?
(Multiple Choice)
4.8/5
(28)
Mark, the manager, must create a policy that establishes how a security program will be set up, lay out the program's goals, assign responsibility, show the strategic and tactical value of security, and outline how enforcement should be carried out. What policy is Mark creating?
(Multiple Choice)
4.7/5
(35)
There are four categories of software licensing. Which item is not one of those categories?
(Multiple Choice)
4.7/5
(31)
What type of attack has the goal of uncovering sensitive information without wanting to compromise any type of flaw or weakness?
(Multiple Choice)
4.9/5
(45)
What causes vulnerability that can lead to threats and exposures?
(Multiple Choice)
4.9/5
(29)
What addresses the issues involved with identify theft and credit card fraud?
(Multiple Choice)
4.8/5
(35)
Jessica committed a crime a few months ago. She isn't as worried as others may be because she believes she is the first to ever commit this particular crime, but she is wrong and there has been precedent set. What type of law did Jessica break?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)