Saint Leo COM590 Final Exam 100% Accurate

Question 1 (4 points)

Saved What is pretexting associated with?

Question 1 options:

Hiring personnel Communication between senior management and general employees Policy dissemination Social engineering

Question 2 (4 points)

Saved Pam receives an offensive joke via e-mail from Larry, a co-worker. Which of the following helps Pam know the correct actions to take?

Question 2 options:

SAP

AUP

None of the above

PAA

Question 3 (4 points)

Saved Which type of agreement would you have a contract system administrator (temporary worker) sign?

Question 3 options:

PAA

Both A and C

AUP

SAP

Question 4 (4 points)

Saved A standard for Web Services from an external provider would be part of which set of policies?

Question 4 options:

WAN Domain policies System/Application Domain policies User Domain policies LAN Domain policies

Question 5 (4 points)

Saved Which of the following would include information on firewalls that handle application traffic?

Question 5 options:

WAN Domain policies System/Application Domain policies LAN Domain policies User Domain policies

Question 6 (4 points)

Saved A LAN Domain policy would include guidelines for which of the following?

Question 6 options:

Telecommunications User access rights IDS and IPS architecture and management Applications

Question 7 (4 points)

Saved Which U.S. military data classification refers to data that the unauthorized disclosure of which would reasonably be expected to cause serious damage to national security?

Question 7 options:

Secret Top Secret Confidential Unclassified

Question 8 (4 points)

Saved Which policy outlines the process by which a BCP and DRP plan is activated?

Question 8 options:

Server Policy Disaster Declaration Policy

RTP

Incident Policy

Question 9 (4 points)

Saved In a business classification scheme, which classification refers to routine communications within the organization?

Question 9 options:

Highly sensitive Public Internal Sensitive

Question 10 (4 points)

Saved Triage is performed during which phase of incident response?

Question 10 options:

Discovery Clean-up Containing and Minimizing Reporting Previous PageNext Page

Question 11 (4 points)

Saved Evidence from an incident must be documented and protected from the time it’s obtained to the time it’s presented in court. Which tool is used to document this evidence?

Question 11 options:

Writ of evidence Chain of custody Incident log Real evidence docket

Question 12 (4 points)

Saved According to the Payment Card Industry Data Security Standard (PCI DSS), what is classified as an incident?

Question 12 options:

An incomplete transaction Loss of a password Denial of Service attack Wi-Fi password loss

Question 13 (4 points)

Saved Before an incident can be declared, the IRT must develop an incident __________ for incident response.

Question 13 options:

procedure budget discovery process control

Question 14 (4 points)

Saved What is a benefit of instructor-led classroom training for security awareness?

Question 14 options:

Low cost Flexibility Both A and B Neither A nor B

Question 15 (4 points)

Saved What is a common consequence of failing to adhere to an acceptable use policy (AUP)?

Question 15 options:

Loss of computer privileges at work E-mail reminder Nothing; an AUP is only a guideline Disciplinary action

Question 16 (4 points)

Saved Implementing IT security policies is as much about __________ as it is about implementing controls.

Question 16 options:

changing attitudes changing personnel disciplinary actions budgeting

Question 17 (4 points)

Saved Which of the following is a common cause of security breaches?

Question 17 options:

Outsourced processing to vendors Improved training and security awareness Increased employee motivation Inadequate management and user decisions

Question 18 (4 points)

Saved What is the name of a common control that is used across a significant population of systems, applications, and operations?

Question 18 options:

Pervasive Enterprise Perpetual Persistent

Question 19 (4 points)

Saved __________ is/are key(s) to security policy enforcement.

Question 19 options:

IT personnel support Executive support Physical controls A communications plan

Question 20 (4 points)

Saved Your company does not want its employees to use the Internet to exchange personal e-mail during work hours. What is the best tool to use to ensure the company does not violate an employee’s right to privacy?

Question 20 options:

Encryption A risk assessment An acceptable use policy A data leakage protection system

Question 21 (4 points)

Saved Which of the following is least likely to indicate the effectiveness of an organization’s security policies?

Question 21 options:

Vulnerability assessments Detective controls Policy compliance reviews An incident response plan

Question 22 (4 points)

Saved Which organization created the Security Content Automation Protocol (SCAP) as part of its responsibilities under FISMA?

Question 22 options:

Microsoft The MITRE Corporation

US-CERT

NIST

Question 23 (4 points)

Saved A(n) __________ can include a computer’s full operating system, applications, and system settings, including security and configuration settings.

Question 23 options:

baseline image group policy patch

Question 24 (4 points)

Saved What does a configuration management database (CMDB) hold?

Question 24 options:

System configuration information Policy change documentation Security policies None of the above

Question 25 (4 points)

Saved What is a vulnerability window?

Question 25 options:

The time between when a new vulnerability is discovered and when software developers start writing a patch. The time required to image a computer. System downtime associated with a successful attack. The period of time during which an attacker may launch a DoS attack.

2,086views
4.1
(15 ratings)

Related Study Guides

Assessment 3 | Nursing homework help

assessment 3 marialex.perez55Develop a 10–12 slide power point presentation - 3 months ago - 20 assessment3.docx - Nurs4065__Ethical_and_Policy_Factors_in_Care_Coordination.mp4 - assessment3.docx asse...

political-sciencenursing

Creative | Nursing homework help

creative Ashnicole7227!!In this creative writing, you will take on the role of an advocate and analyze how federal and state powers interact in addressing public, health, and environmental issues. Uti...

political-sciencestatistics

Criminal justice 14 | Criminal homework help

8. Is prostitution connected to other crimes? What crimes? PART 4 The book for this course is Criminal-Law-OER.pdf Killeen Texas, May 1st, 2020. Sam likes to smoke crack and his addiction and related...

human-resourcespolitical-science

Help with home work | health care | Indiana University-Purdue University at Indianapolis - Indianapolis, IN

help with home work eubates- a month ago - 25 Unit.9.assignment.example.docx Nus505unit9assignment.docx Nus505unit9assignment.docx Nus 505 unit 9 assignment: Concept Map: Collaborative and Advocacy Op...

art-designcommunication

HIST405N Week 7 | US Culture and History in History - Chamberlain university

HIST405N United States History Week 7 Assignment Required Resources Read/review the following resources for this activity: Textbook: Chapter 28, 29, 30 Lesson Minimum of 1 primary source Minimum of 4...

historyart-design

Problem set 14 | Business & Finance homework help

Problem set 14 VIK1299Petersen & Peterson Company is a 6-year-old company founded by Jackson Peterson and Mary Peterson to exploit metamaterial plasmonic technology to develop and manufacture miniatur...

political-sciencecommunication

Project | Management homework help

5. Submission package: Tuesday morning Eastern. This cadence emphasizes early value and interim deliverables, consistent with PMBOK 7e’s Delivery of Value perspective. Change control within documents...

political-sciencecommunication

Assignment 1 Securing a Remote Work Environment for a Global Corporation | CSIS 343 - Cybersecurity

4. Collaborative Tools Security: Assess the security of collaborative tools used for remote communication and document sharing. Propose security measures for video conferencing platforms, file-sharing...

communicationhuman-resources

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student