CIS 462 SECURITY AND STRATEGY FINAL EXAM
Question 1
2 out of 2 points
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements. |
||||
|
2 out of 2 points
At Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? |
||||
|
2 out of 2 points
A risk exposure is defined as the impact to the organization when a situation transpires. The widely accepted formula for calculating exposure is as follows: |
||||
|
2 out of 2 points
One of the most important approaches used to secure personal data is ________________, which is the process used to prove the identity of an individual. ______________, however, is the process used to enable a person’s access privileges. |
||||
|
2 out of 2 points
The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term ______________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. |
||||
|
2 out of 2 points
Despite the fact that there exists no mandatory scheme of data classification for private industry, there are four classifications used most frequently. Which of the following is not one of the four? |
||||
|
2 out of 2 points
Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach? |
||||
|
2 out of 2 points
Which of the following statements does not offer an explanation of what motivates an insider to pose a security risk? |
||||
|
2 out of 2 points
Consider this scenario: After many years, an employee is promoted to a position that has an elevated level of trust with his management. He started with the company in an entry-level position, and then moved from a supervisory to a managerial role. This role entails that the employee trains other employees and has a deep understanding of how the department functions. Which of the following actions should be taken in regard to this employee’s levels of access during the span of time he has worked for the company? |
||||
|
2 out of 2 points
Which of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning? |
||||
|
2 out of 2 points
When is the best time to implement security policies to help developers diminish the number of vulnerabilities during application development? |
||||
|
2 out of 2 points
Aside from human user types, there are two other non-human user groups. Known as account types, ________________ are accounts implemented by the system for the purpose of supporting automated service, and ___________________ are accounts that remain non-human until individuals are assigned access and can use them to recover a system following a major outage. |
||||
|
2 out of 2 points
Which of the following is not one of the types of control partners? |
||||
|
2 out of 2 points
One of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an organization? |
||||
|
0 out of 2 points
Which of the following statements illustrates the importance of the LAN-to-WAN domain to an organization’s security? |
||||
|
2 out of 2 points
The ______________________ denotes the application software and technology that concerns a wide range of topics from the data management to the systems that process information. |
||||
|
0 out of 2 points
Depending on the organization, the control procedure of the Domain Name System (DNS) might be built into the WAN standard. This standard identifies the criteria securing a domain name. Which of the following is not one of the types of approvals that can be used to track domains? |
||||
|
0 out of 2 points
Which of the following types of baseline documents is often created to serve the demands of the workstation domain? |
||||
|
0 out of 2 points
Which the following is not one the policies concerned with LAN-to-WAN filtering and connectivity? |
||||
|
Question 20
2 out of 2 points
An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth. Which of the following is not an example of a layer of security? |
||||
|
2 out of 2 points
A procure document should accompany every baseline document. Which of the following is a true statement about the circumstances for when a procedure document needs to be created to support the baseline document? |
||||
|
2 out of 2 points
LAN security policies center on issues concerning connectivity; this includes determining how devices adhere to the network. Among the types of LAN control standards are _______________, which creates the schedules on LAN-attached devices for scheduled preventative and consistent maintenance, and ________________, which explains the change control management process for soliciting changes, granting changes, and implementing changes on the network |
||||
|
2 out of 2 points
In order to assess policy compliance, many organizations will use a report card. The evaluation tools are comprised of criteria based on an organization’s requirements. Which of the following is not one the elements that would be included on a report card? |
||||
|
0 out of 2 points
One of the six specifications for entities that implement SCAP is to provide particular names for operation systems, applications, and hardware. This specification articulates a standard naming convention for systems to promote consistency across varied products. Which of the following specifications fits this description? |
||||
|
2 out of 2 points
A baseline is a point of departure that guarantees that systems comply with security requirements when they are enacted. However, it is not an uncommon occurrence that systems are changed in a way that means they are no longer in compliance. Thus, it is necessary to use an accepted method to ensure that settings have not been changed. Which of the following is not one of these methods? |
||||
|
2 out of 2 points
In order to ensure compliance, organizations deploy both new and current technologies. Which of the following is not one these new technologies? |
||||
|
2 out of 2 points
One of the methods that an organization can use to determine compliance is to perform _______________. |
||||
|
2 out of 2 points
Consider this scenario: A sales organization with an onsite IT staff experiences a major outage due to a minor change to a printer. Though systems were working successfully, the printer stopped working when a new server was added to the network. The new server that was added to the network shared the same IP address as the printer. Which of the following statements captures a contributing cause of the problem with the IP compatibility? |
||||
|
2 out of 2 points
A security _____________identifies a group of fundamental configurations designed to accomplish particular security objectives. |
||||
|
2 out of 2 points
Many organizations have a(n) ________________________, which is comprised of end user devices (including tablets, laptops, and smartphones) on a shared network and that use distributed system software; this enables these devices to function simultaneously, regardless of location. |
||||
|
0 out of 2 points
The scope of security awareness training must be customized based on the type of user assigned to each role in an organization. For instance, it is important that ________________ receives training in security basic requirement, regulatory and legal requirement, detail policy review, and reporting suspicious activity. |
||||
|
0 out of 2 points
Training that happens in a classroom has many benefits, but which of the following is the one of the most significant drawbacks concerning the instructors’ abilities? |
||||
|
2 out of 2 points
__________________ is a term that denotes the way that a policy either diminishes business disruptions or facilitates the business’s success. |
||||
|
0 out of 2 points
Which of the following is not one the consequences of having an unmotivated employee? |
||||
|
2 out of 2 points
The goal of employee awareness and training is to ensure that individuals are equipped with the tools necessary for the implementation of security policies. Which of the following is one of the other benefits of a successfully enacted training and awareness program? |
||||
|
2 out of 2 points
In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the executives _______________________. |
||||
|
0 out of 2 points
In information security, the individual responsible for setting goals for implementing security policies is the _________________. |
||||
|
2 out of 2 points
There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is not an automated control? |
||||
|
2 out of 2 points
One of the many roles of the security compliance committee is to focus on controls that are widely used across a large population of applications, systems, and operations. These types of controls are known as ___________________. |
||||
|
2 out of 2 points
___________________ are responsible for the monitoring of activities the pre, middle, and post stages of goal implementation, whereas __________________are responsible for the monitoring of activities following the implementation and are called upon to evaluate whether or not the goals have been achieved. |
||||
|
2 out of 2 points
It is important that security policies establish a concrete distinction between work life and home life. Such a distinction requires that employees understand that they have no expectation of _______________. |
||||
|
2 out of 2 points
The Gramm-Leach-Bliley Act (GLBA) was created to protect confidentiality and security of customer information. Thus, under GLBA, organizations are required to inform regulators quickly if any unauthorized access or breach has occurred. Consider this scenario: A bank teller accesses a customer account out of curiosity. What is best course of action following this event? |
||||
|
2 out of 2 points
____________________ are instituted by the executive management and are responsible for enforcing policies by reviewing technology activity and greenlighting new projects and activities. |
||||
|
0 out of 2 points
Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an incident, whereas the __________________ role is to monitor and document all the activity that unfolds during an incident. |
||||
|
2 out of 2 points
___________________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices. |
||||
|
2 out of 2 points
The IRT report that is ultimately generated for executive management must be certain to educate all stakeholders regarding exploited risks. Which of the following items is not required to be addressed in the report? |
||||
|
0 out of 2 points
In general, the IRT is comprised of a team with individuals that have different specialties; one such individual is the ___________________, who offers analytical skills and risk management. This specialist has focused forensic skills necessary for the collection and analysis of evidence. |
||||
|
2 out of 2 points
Which of the following departments has a significant role to play concerning the act of creating the messaging around an incident to the media and the parties impacted? |
||||
|
2 out of 2 points
In order to form an IRT, an organization is required to create a charter; this document identifies the authority, mission, and goals of a committee or team, and there are a number of different types of IRT models for doing this. Which of the following models permits an IRT to have the complete authority to ensure a breach is contained? |
||||
|
2 out of 2 points
An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations. |
||||
|
Follow Us