Exam 13: Security Policy Design and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following best describes ROI?

(Multiple Choice)
4.9/5
(33)

The __________________ phase of the system development life cycle can lead you to the needs assessment phase where the cycle begins again.

(Short Answer)
4.8/5
(37)

Which of the following is NOT among the six factors needed to create a risk analysis?

(Multiple Choice)
4.9/5
(37)

VPNs create a _____________ to transport information through public communications media.

(Short Answer)
4.8/5
(30)

Which of the following is a network's ability to detect attacks when they occur and to evaluate the extent of damage and compromise?

(Multiple Choice)
4.7/5
(33)

MATCHING -network protocols that encapsulate (wrap)one protocol or session inside another

(Multiple Choice)
4.8/5
(34)

MATCHING -routers,cables,bastion hosts,servers,and firewall components that enable employees to communicate with one another

(Multiple Choice)
4.8/5
(32)

Which is best defined as the ability of a system to continue operations despite a failure?

(Multiple Choice)
4.9/5
(37)

MATCHING -a legal document issued by a court that allows authorities to search a particular place for specific evidence

(Multiple Choice)
5.0/5
(36)

Once written,a security policy should not be altered so that you can maintain consistency.

(True/False)
4.9/5
(29)

By providing _________________ through backup systems,you ensure information remains accessible if primary systems go offline.

(Short Answer)
4.7/5
(34)

What is considered the first step in formulating a security policy?

(Multiple Choice)
4.8/5
(38)

Which of the following shows how devices are connected and includes an IP allocation register?

(Multiple Choice)
4.7/5
(26)

The people that manage security for the organization should not be same people that conduct risk analysis.

(True/False)
4.7/5
(39)

Which of the following is NOT a step in threat and risk assessment?

(Multiple Choice)
4.9/5
(30)

What are three areas in which the use of encryption should be considered to maintain confidentiality?

(Short Answer)
4.8/5
(33)

The portion of a security policy that describes who responds when there has been a security breach is called the ______________ response section.

(Short Answer)
4.7/5
(31)

What is a server security policy? List at least three areas the policy should address.

(Essay)
4.8/5
(43)

Search warrants and subpoenas were developed in response to the _____________ Amendment which protects U.S.residents against illegal search and seizure.

(Short Answer)
4.9/5
(32)

Which of the following is NOT a phase in the system development life cycle?

(Multiple Choice)
4.7/5
(32)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)