Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security.

Janette is the director of her company's network infrastructure group. She is explaining to the business owners the advantages and disadvantages of outsourcing network security. One consideration she presents is the question of who would be responsible for the data, media, and infrastructure. What consideration is she describing?
Question 1 options:
Adherence to policy
Ownership
Privacy
Risk
Question 2(1 point)
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Question 2 options:
Higher degree of privacy
Access to a higher level of expertise
Developing in-house talent
Building internal knowledge
Question 3(1 point)
Biyu is a network administrator. She is developing the compliance aspect of her company's security policy. Currently, she is focused on the records of actions that the organization's operating system or application software creates. What aspect of compliance is Biyu focusing on?
Question 3 options:
Certification
Event logs
Professional ethics
Remediation
Question 4(1 point)
Omar is an infrastructure security professional. After reviewing a set of professional ethics issued by his company, he is learning and adopting ethical boundaries in an attempt to demonstrate them to others. What is this called?
Question 4 options:
Encouraging the adoption of ethical guidelines and standards
Informing users through security awareness training
Communicating the freedom to access all system resources
Understanding common assumptions that lead computer users to unethical behavior
Question 5(1 point)
Mia is her company's network security professional. She is developing access policies based on personnel security principles. As part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. What practice is she developing?
Question 5 options:
Job rotation
Limiting access
Mandatory vacations
Separation of duties
Question 6(1 point)
Hajar is a network engineer. She is creating a system of access involving clearance and classification based on users and the objects they need in a secure network. She is restricting access to secure objects by users based on least privilege and which of the following?
Question 6 options:
Job rotation
Security awareness
Need to know
Separation of duties
Question 7(1 point)
Rodrigo has just received an email at work from an unknown person. The sender claims to have incriminating evidence against Rodrigo and threatens to release it to his employer and his family unless he discloses certain confidential information about his employer's company. Rodrigo does not know that several other people in the organization received the same email. What form of social engineering has occurred?
Question 7 options:
Intimidation
Name dropping
Appeal for help
Phishing
Question 8(1 point)
Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic security settings that should apply to all systems. What type of document should she create?
Question 8 options:
Baseline
Policy
Guideline
Procedure
Question 9(1 point)
Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these types of classification decisions?
Question 9 options:
Value
Sensitivity
Criticality
Threat
Question 10(1 point)
Rylie is a newly hired cybersecurity expert for a government agency. Rylie used to work in the private sector. She has discovered that, whereas private sector companies often had confusing hierarchies for data classification, the government's classifications are well known and standardized. As part of her training, she is researching data that requires special authorization beyond normal classification. What is this type of data called?
Question 10 options:
Compartmentalized
Assured
Public
Exclusive
Question 11(1 point)
Maria receives a ciphertext message from her colleague Wen. What type of function does Maria need to use to read the plaintext message?
Question 11 options:
Encryption
Hashing
Decryption
Validation
Question 12(1 point)
Which approach to cryptography uses highly parallel algorithms that could solve problems in a fraction of the time needed by conventional computers?
Question 12 options:
Quantum cryptography
Asymmetric cryptography
Elliptic curve cryptography
Classic cryptography
Question 13(1 point)
Bob is sending a message to Alice. He wants to ensure that nobody can read the content of the message while it is in transit. What goal of cryptography is Bob attempting to achieve?
Question 13 options:
Confidentiality
Integrity
Authentication
Nonrepudiation
Question 14(1 point)
Bob is sending a message to Alice. He wants to ensure that nobody

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts of Database Management

Authors: Philip J. Pratt, Mary Z. Last

8th edition

1285427106, 978-1285427102

More Books

Students also viewed these Databases questions

Question

Do you think the banquet is a ritual? Why or why not?

Answered: 1 week ago

Question

How can speakers enhance their credibility?

Answered: 1 week ago