Exam 14: Risk Mitigation
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Matching
-A network that does not have servers, so each device simultaneously functions as both a client and a server to all other devices connected to the network.
(Multiple Choice)
4.8/5
(31)
What kind of policy outlines how organizations use personal information it collects?
(Multiple Choice)
4.8/5
(35)
What are values that are attributed to a system of beliefs that help the individual distinguish right from wrong called?
(Multiple Choice)
4.9/5
(36)
The objective of incident management is to restore normal operations as quickly as possible with the least possible impact on either the business or the users.
(True/False)
4.7/5
(38)
List one reason why social networking sites are popular with attackers.
(Essay)
4.8/5
(31)
A person's fundamental beliefs and principals, which are used to define what is good, and how to distinguish right from wrong, are collectively called a person's:
(Multiple Choice)
4.8/5
(46)
A(n) ____________________ is a methodical examination and review that produces a detailed report of its findings.
(Short Answer)
5.0/5
(40)
When designing a security policy, many organizations follow a standard set of ____________________.
(Short Answer)
4.8/5
(40)
Matching
-A security policy that outlines how the organization uses personal information it collects.
(Multiple Choice)
4.8/5
(34)
Most people are taught using a(n) ____________________ approach.
Matching
(Short Answer)
4.9/5
(30)
What can be defined as the study of what a group of people understand to be good and right behavior and how people make those judgments?
(Multiple Choice)
4.8/5
(39)
A(n) ____________________ is a collection of requirements specific to the system or procedure that must be met by everyone.
(Short Answer)
4.8/5
(32)
Matching
-An event that does not appear to be a risk but actually turns out to be one.
(Multiple Choice)
4.9/5
(35)
A due process policy is a policy that defines the actions users may perform while accessing systems and networking equipment.
(True/False)
4.7/5
(33)
Matching
-The expected monetary loss every time a risk occurs.
(Multiple Choice)
4.8/5
(43)
The first phase of the security policy cycle involves a vulnerability assessment.
(True/False)
4.7/5
(29)
Websites that group individuals and organizations into clusters or groups based on some sort of affiliation are considered to be what type of websites?
(Multiple Choice)
4.7/5
(30)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)