Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access

QUESTION 1

Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing?

Identification

Authentication

Accountability

Authorization

0.5 points

QUESTION 2

Which of the following would NOT be considered in the scope of organizational compliance efforts?

Laws

Company policy

Internal audit

Corporate culture

0.5 points

QUESTION 3

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?

Reduced operating costs

Access to a high level of expertise

Developing in-house talent

Building internal knowledge

0.5 points

QUESTION 4

Biyu is making arrangements to use a third-party service provider for security services. She wants to document a requirement for timely notification of security breaches. What type of agreement is most likely to contain formal requirements of this type?

Service level agreement (SLA)

Blanket purchase agreement (BPA)

Memorandum of understanding (MOU)

Interconnection security agreement (ISA)

0.5 points

QUESTION 5

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Service level agreement (SLA)

Blanket purchase agreement (BPA)

Memorandum of understanding (MOU)

Interconnection security agreement (ISA)

0.5 points

QUESTION 6

What is NOT a good practice for developing strong professional ethics?

Set the example by demonstrating ethics in daily activities

Encourage adopting ethical guidelines and standards

Assume that information should be free

Inform users through security awareness training

0.5 points

QUESTION 7

Which practice is NOT considered unethical under RFC 1087 issued by the Internet Architecture Board (IAB)?

Seeking to gain unauthorized access to resources

Disrupting intended use of the Internet

Enforcing the integrity of computer-based information

Compromising the privacy of users

0.5 points

QUESTION 8

What is NOT a principle for privacy created by the Organization for Economic Cooperation and Development (OECD)?

An organization should collect only what it needs.

An organization should share its information.

An organization should keep its information up to date.

An organization should properly destroy its information when it is no longer needed.

0.5 points

QUESTION 9

Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing?

Job rotation

Least privilege

Need-to-know

Separation of duties

0.5 points

QUESTION 10

What is NOT a goal of information security awareness programs?

Teach users about security objectives

Inform users about trends and threats in security

Motivate users to comply with security policy

Punish users who violate policy

0.5 points

QUESTION 11

Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems. What type of document should she create?

Baseline

Policy

Guideline

Procedure

0.5 points

QUESTION 12

Roger's organization received a mass email message that attempted to trick users into revealing their passwords by pretending to be a help desk representative. What category of social engineering is this an example of?

Intimidation

Name dropping

Appeal for help

Phishing

0.5 points

QUESTION 13

Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is NOT normally used to make these type of classification decisions?

Value

Sensitivity

Criticality

Threat

0.5 points

QUESTION 14

Which activity manages the baseline settings for a system or device?

Configuration control

Reactive change management

Proactive change management

Change control

0.5 points

QUESTION 15

What is the correct order of steps in the change control process?

Request, approval, impact assessment, build/test, monitor, implement

Request, impact assessment, approval, build/test, implement, monitor

Request, approval, impact assessment, build/test, implement, monitor

Request, impact assessment, approval, build/test, monitor, implement

0.5 points

QUESTION 16

Marguerite is creating a budget for a software development project. What phase of the system lifecycle is she undertaking?

Project initiation and planning

Functional requirements and definition

System design specification

Operations and maintenance

0.5 points

QUESTION 17

Bob is preparing to dispose of magnetic media and wishes to destroy the data stored on it. Which method is NOT a good approach for destroying data?

Formatting

Degaussing

Physical destruction

Overwriting

0.5 points

QUESTION 18

In an accreditation process, who has the authority to approve a system for implementation?

Certifier

Authorizing official (AO)

System owner

System administrator

0.5 points

QUESTION 19

In what type of attack does the attacker send unauthorized commands directly to a database?

Cross-site scripting

SQL injection

Cross-site request forgery

Database dumping

0.5 points

QUESTION 20

In what software development model does activity progress in a lock-step sequential process where no phase begins until the previous phase is complete?

Spiral

Agile

Lean

Waterfall

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Power Of Numbers In Health Care A Students Journey In Data Analysis

Authors: Kaiden

1st Edition

8119747887, 978-8119747887

More Books

Students also viewed these Databases questions