Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 16 1. Which of the following risks is typically found in the User Domain? A. Software vulnerabilities B. Humans and human nature C. Network

QUESTION 16

1. Which of the following risks is typically found in the User Domain?

A. Software vulnerabilities

B. Humans and human nature

C. Network vulnerabilities

D. Unauthorized access to equipment

QUESTION 17

1. Dealing with employee apathy toward __________ is a risk that is typically found in the User Domain.

A. information systems security policy

B. operating system software vulnerabilities

C. application software vulnerabilities

D. using USB drives containing personal data on company computers

QUESTION 18

1. Implementing an e-mail filtering and quarantining system that examines embedded URL links inside e-mails and examines unknown file attachments in e-mails would be a security control to mitigate risks in the:

A. LAN Domain.

B. LAN-to-WAN Domain.

C. User Domain.

D. Workstation Domain.

QUESTION 19

1. Operating system software vulnerabilities and application software vulnerabilities are risks and threats that are typically found in the:

A. LAN Domain.

B. LAN-to-WAN Domain.

C. User Domain.

D. Workstation Domain.

QUESTION 20

1. Implementing content filtering and intrusion detection/intrusion prevention systems at the Internet ingress/egress as well as disabling system administration rights on user workstations are strategies that can be used for preventing users from:

A. downloading and installing unauthorized applications and software onto organization-owned IT assets.

B. inserting CDs, DVDs, and USB drives with personal data onto organization-owned IT assets.

C. accessing the Internet and surfing the Web.

D. clicking on unknown e-mail attachments and files.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Visual Basic 4 Ole Database And Controls Superbible

Authors: Michael Hatmaker, C. Woody Butler, Ibrahim Malluf, Bill Potter

1st Edition

1571690077, 978-1571690074

More Books

Students also viewed these Databases questions