Description
CSIS 340 Final Exam – Question and Answers
- It is necessary to retain data for what major reasons?
- __________ techniques can provide a security baseline for full operating systems and applications?
- Good reasons to monitor worker’s computer activities are when __________?
- Data classification for retention of information is typically __________ for financial and tax records?
- __________ software is capable of capturing usernames, passwords, and websites visited on a local workstation?
- Which of the following includes guidelines under the LAN domain policies?
- Which of the following should be in an information response team charter?
- Once security policies are established, line management must __________?
- A __________ is a common control that is used across a significant population of systems?
- The Risk Management Continuous Improvement Model includes __________?
- What needs do organizations have to classify data?
- Web services policies would be an example of __________ domain.
- Data in transit refers to what type of data?
- Security experts consider __________ the weakest link in security.
- Which of the following is a common cause of security breaches?
- The ______________ model was the first model developed to address the concerns of integrity. Originally published in 1977
- A __________ standard describes the requirements for obtaining a domain name for use by external parties?
- A __________ is a specialized group of people whose purpose is to respond to major incidents.
- Which is the first step in building a business continuity plan?
- Baseline standards for the LAN domain would include _____.
- A(n) _____ has an easier time bypassing security controls and hiding his or her tracks by deleting or altering logs and time stamps.
- To promote cultural change, the goal should be to make security policies __________?
- Simple security policy awareness requires that _____ report suspicious activity?
- __________ occurs when you manipulate or trick a person into weakening the security of an organization?
- You can use a __________ process to grant temporary elevated rights.
- The _____ domain connects an organizations private network to the Internet?
- Outdated application controls place a greater reliance on _____?
- __________ determines how quickly a business process should be recovered.
- A ___________ is the first step in building a business continuity plan (BCP) to minimize losses.
- When analyzing an incident, you must try to determine which of the following?
- Employer response to an employee posting company passwords on their social network site should include _____?
- The following organization has offered reliable security policies in the past to help organizations develop proper infrastructure policies.
- Without a policy that leads to controls that restrict employees from installing their own software on a company workstation, a company could suffer which of the following consequences?
- Without __________ sponsorship, users will be less likely to eagerly participate in awareness
- A(n) ___________ ensures workers are conscious of security risks and how to deal with unexpected risk
- The Security Compliance Committee __________?
- Which of the following is not an organizational challenge when implementing security policies?
- A business impact analysis requires an impact report, component reliance, and a __________.
- Production data should be _____ before being used in a test environment?
- __________ protects data at rest from all type of breaches.
- The following documents help capture domain security control requirements?
- A malicious __________ attack uses viruses, worms, Trojan horses, and scripts to gain access to systems, applications, and data.
- A __________ can identify hosts on a network and determine services running on the hosts.
- What is a strong indicator that awareness training is not effective?
- The __________ model uses mandatory access control to enforce the DoD multilevel security policy.
- __________ typically have the technical skills to make critical recommendation on how to stop an attack.
- __________ are especially useful for identifying unauthorized changes.
- __________ often focuses on enterprise risk management across multiple lines of business to resolve strategic business issues.
- Which of the following can you use to segment LANs?
- Which of the following does an acceptable use policy relate to?