Exam 14: Risk Mitigation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization?

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

B

A collection of suggestions that should be implemented are referred to as a:

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

Contrast the difference between a pedagogical approach versus an andragogical approach to subject matter.

Free
(Essay)
4.8/5
(27)
Correct Answer:
Verified

In a pedagogical approach, the subject matter is defined by what the teacher wants to give. In an andragogical approach, learning is organized around situations in life or at work.

Audits serve to verify that the security protections enacted by an organization are being followed and that corrective actions can be swiftly implemented before an attacker exploits a vulnerability.

(True/False)
4.9/5
(30)

A written document that states how an organization plans to protect the company's information technology assets is a:

(Multiple Choice)
4.8/5
(33)

What kind of learners learn from taking notes, being at the front of the class, and watching presentations?

(Multiple Choice)
4.8/5
(42)

Matching -Risk control type that covers the operational procedures to limit risk​

(Multiple Choice)
4.8/5
(33)

Matching -The "framework" and functions required to enable incident response and incident handling within an organization.​

(Multiple Choice)
4.8/5
(41)

Policies that include statements regarding how an employee's information technology resources will be addressed are part of a:

(Multiple Choice)
4.8/5
(23)

Which roles should be represented on the security policy development team?

(Essay)
5.0/5
(37)

Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?

(Multiple Choice)
4.8/5
(30)

Which type of network below uses a direct connection between users, and involves each device simultaneously acting as a client and a server?

(Multiple Choice)
4.9/5
(26)

What concept below is at the very heart of information security?

(Multiple Choice)
4.7/5
(32)

Matching -​A policy that defines the actions users may perform while access systems and networking equipment

(Multiple Choice)
4.9/5
(33)

List four attributes that should be compiled for new equipment in the change management documentation.

(Essay)
4.8/5
(36)

Matching -A methodology for making modifications to a system and keeping track of those changes.​

(Multiple Choice)
4.9/5
(41)

Identify two opportunities for security education and training.

(Essay)
4.9/5
(45)

____________________ seeks to approach changes systematically and provide the necessary documentation of the changes.

(Short Answer)
4.8/5
(31)

What is a general security tip for using a social networking site?

(Essay)
4.9/5
(38)

Matching -​An event that in the beginning is considered to be a risk yet turns out to not be one.

(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)