Exam 2: Security Policies and Standards
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Match each item with a statement below.
-Informal part of an organization's culture.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
G
Match each item with a statement below.
-Ensures that critical business functions continue if a catastrophic incident or disaster occurs.
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
D
An attack scenario end case is categorized ____.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
The details of the allowable use of company-owned networks and the Internet would most likely be covered in the enterprise information security policy.
(True/False)
4.9/5
(42)
Policies are put in place to support the organization's mission, vision, and strategic planning.
(True/False)
4.7/5
(32)
____________________ management differs dramatically from incident response, as it focuses first and foremost on the people involved.
(Short Answer)
4.8/5
(35)
Attack profiles should include scenarios depicting a typical attack, with details on the method, the indicators, and the broad consequences of the attack.
(True/False)
4.8/5
(39)
Within the IETF, the Security Area Working Group acts as an advisory board for security topics that affect the various Internet-related protocols.
(True/False)
4.9/5
(38)
Match each item with a statement below.
-Set of rules for the protection of an organization's information assets.
(Multiple Choice)
5.0/5
(33)
A security framework specifies the tasks for deploying security tools in the order in which they are to be accomplished.
(True/False)
4.8/5
(29)
Match each item with a statement below.
-The set of activities taken to plan for, detect, and correct the impact of an incident on information assets.
(Multiple Choice)
4.8/5
(32)
What are spheres of security? Provide examples illustrating the different components.
(Essay)
4.8/5
(35)
A(n) ____________________ is also known as a general security policy, an IT security policy, or an information security policy.
(Short Answer)
4.9/5
(41)
Explain what might happen if managerial guidance SysSP documents have not been written or provided to technical staff.
(Essay)
4.8/5
(38)
A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.
(Multiple Choice)
4.7/5
(46)
The first phase in the development of the contingency planning process is the ____.
(Multiple Choice)
4.8/5
(33)
The ____ is created by a systems administer to direct practices with many details.
(Multiple Choice)
5.0/5
(27)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)