Exam 2: Security Policies and Standards
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
A security ____ is an outline of the overall information security strategy and a roadmap for planned changes to the organization's information security environment.
(Multiple Choice)
4.7/5
(29)
The ____ illustrates the ways in which people access information.
(Multiple Choice)
4.7/5
(37)
What criteria must a policy meet to be considered effective and legally enforceable?
(Essay)
4.9/5
(36)
Match each item with a statement below.
-Investigation and assessment of the impact that various attacks can have on the organization.
(Multiple Choice)
4.8/5
(35)
The identification of critical business functions and the resources needed to support them is the cornerstone of the ____________________ plan.
(Short Answer)
4.9/5
(24)
Match each item with a statement below.
-Created by management to guide the implementation and configuration of a specific technology so as to direct the way a technology is to be used to control the behavior of people in the organization.
(Multiple Choice)
4.8/5
(40)
____ planning prepares an organization to reestablish critical business operations during a disaster that affects operations at the primary site.
(Multiple Choice)
4.8/5
(37)
A(n) ____________________ is a set of specifications that identifies a piece of technology's authorized users and includes details on the rights and privileges those users have on that technology.
(Short Answer)
4.8/5
(41)
How does an EISP address an organization's need to comply with laws and regulations?
(Essay)
4.8/5
(40)
Match each item with a statement below.
-Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely.
(Multiple Choice)
4.9/5
(31)
Practices, procedures, and guidelines effectively explain how to comply with ____.
(Multiple Choice)
4.9/5
(28)
A(n) ____ is detailed description of the activities that occur during an attack.
(Multiple Choice)
4.9/5
(39)
The analysis and prioritization of the business functions within the organization's departments, sections, divisions, groups, or other units to determine which are most vital to continued operations is called ____.
(Multiple Choice)
5.0/5
(23)
The ____ of an organization is a written statement of its purpose.
(Multiple Choice)
4.8/5
(31)
Establishing a contact number of hot line is an aspect of ____ planning.
(Multiple Choice)
4.8/5
(37)
Match each item with a statement below.
-Published, scrutinized, and ratified by a group.
(Multiple Choice)
4.8/5
(32)
____ are the specific instructions entered into a security system to regulate how it reacts to the data it receives.
(Multiple Choice)
4.8/5
(25)
A(n) ____ plan addresses the identification, classification, response, and recovery from an incident.
(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)