Exam 13: Security Policy Design and Implementation
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
The __________________ phase of the system development life cycle can lead you to the needs assessment phase where the cycle begins again.
(Short Answer)
4.8/5
(37)
Which of the following is NOT among the six factors needed to create a risk analysis?
(Multiple Choice)
4.9/5
(37)
VPNs create a _____________ to transport information through public communications media.
(Short Answer)
4.8/5
(30)
Which of the following is a network's ability to detect attacks when they occur and to evaluate the extent of damage and compromise?
(Multiple Choice)
4.7/5
(33)
MATCHING
-network protocols that encapsulate (wrap)one protocol or session inside another
(Multiple Choice)
4.8/5
(34)
MATCHING
-routers,cables,bastion hosts,servers,and firewall components that enable employees to communicate with one another
(Multiple Choice)
4.8/5
(32)
Which is best defined as the ability of a system to continue operations despite a failure?
(Multiple Choice)
4.9/5
(37)
MATCHING
-a legal document issued by a court that allows authorities to search a particular place for specific evidence
(Multiple Choice)
5.0/5
(36)
Once written,a security policy should not be altered so that you can maintain consistency.
(True/False)
4.9/5
(29)
By providing _________________ through backup systems,you ensure information remains accessible if primary systems go offline.
(Short Answer)
4.7/5
(34)
What is considered the first step in formulating a security policy?
(Multiple Choice)
4.8/5
(38)
Which of the following shows how devices are connected and includes an IP allocation register?
(Multiple Choice)
4.7/5
(26)
The people that manage security for the organization should not be same people that conduct risk analysis.
(True/False)
4.7/5
(39)
Which of the following is NOT a step in threat and risk assessment?
(Multiple Choice)
4.9/5
(30)
What are three areas in which the use of encryption should be considered to maintain confidentiality?
(Short Answer)
4.8/5
(33)
The portion of a security policy that describes who responds when there has been a security breach is called the ______________ response section.
(Short Answer)
4.7/5
(31)
What is a server security policy? List at least three areas the policy should address.
(Essay)
4.8/5
(43)
Search warrants and subpoenas were developed in response to the _____________ Amendment which protects U.S.residents against illegal search and seizure.
(Short Answer)
4.9/5
(32)
Which of the following is NOT a phase in the system development life cycle?
(Multiple Choice)
4.7/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)