Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security.
Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?
Question options:
Adherence to policy
Ownership
Privacy
Risk
Question point
Mark is considering outsourcing security functions to a thirdparty service provider. What benefit is he most likely to achieve?
Question options:
Higher degree of privacy
Access to a higher level of expertise
Developing inhouse talent
Building internal knowledge
Question point
Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on
Question options:
Certification
Event logs
Professional ethics
Remediation
Question point
Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?
Question options:
Encouraging the adoption of ethical guidelines and standards
Informing users through security awareness training
Communicating the freedom to access all system resources
Understanding common assumptions that lead computer users to unethical behavior
Question point
Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking highsecurity tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?
Question options:
Job rotation
Limiting access
Mandatory vacations
Separation of duties
Question point
Hajar is a network engineer. She is creating a system of access involving clearance and classification based on users and the objects they need in a secure network. She is restricting access to secure objects by users based on least privilege and which of the following?
Question options:
Job rotation
Security awareness
Need to know
Separation of duties
Question point
Rodrigo has just received an email at work from an unknown person. The sender claims to have incriminating evidence against Rodrigo and threatens to release it to his employer and his family unless he discloses certain confidential information about his employer's company. Rodrigo does not know that several other people in the organization received the same email. What form of social engineering has occurred?
Question options:
Intimidation
Name dropping
Appeal for help
Phishing
Question point
Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic security settings that should apply to all systems. What type of document should she create?
Question options:
Baseline
Policy
Guideline
Procedure
Question point
Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these types of classification decisions?
Question options:
Value
Sensitivity
Criticality
Threat
Question point
Rylie is a newly hired cybersecurity expert for a government agency. Rylie used to work in the private sector. She has discovered that, whereas private sector companies often had confusing hierarchies for data classification, the government's classifications are well known and standardized. As part of her training, she is researching data that requires special authorization beyond normal classification. What is this type of data called?
Question options:
Compartmentalized
Assured
Public
Exclusive
Question point
Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?
Question options:
Encryption
Hashing
Decryption
Validation
Question point
Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?
Question options:
Quantum cryptography
Asymmetric cryptography
Elliptic curve cryptography
Classic cryptography
Question point
Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?
Question options:
Confidentiality
Integrity
Authentication
Nonrepudiation
Question point
Bob is sending a message to Alice. He wants to ensure that nobody
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started