Question
QUESTION 16 1. Which of the following risks is typically found in the User Domain? A. Software vulnerabilities B. Humans and human nature C. Network
QUESTION 16
1. Which of the following risks is typically found in the User Domain?
A. Software vulnerabilities
B. Humans and human nature
C. Network vulnerabilities
D. Unauthorized access to equipment
QUESTION 17
1. Dealing with employee apathy toward __________ is a risk that is typically found in the User Domain.
A. information systems security policy
B. operating system software vulnerabilities
C. application software vulnerabilities
D. using USB drives containing personal data on company computers
QUESTION 18
1. Implementing an e-mail filtering and quarantining system that examines embedded URL links inside e-mails and examines unknown file attachments in e-mails would be a security control to mitigate risks in the:
A. LAN Domain.
B. LAN-to-WAN Domain.
C. User Domain.
D. Workstation Domain.
QUESTION 19
1. Operating system software vulnerabilities and application software vulnerabilities are risks and threats that are typically found in the:
A. LAN Domain.
B. LAN-to-WAN Domain.
C. User Domain.
D. Workstation Domain.
QUESTION 20
1. Implementing content filtering and intrusion detection/intrusion prevention systems at the Internet ingress/egress as well as disabling system administration rights on user workstations are strategies that can be used for preventing users from:
A. downloading and installing unauthorized applications and software onto organization-owned IT assets.
B. inserting CDs, DVDs, and USB drives with personal data onto organization-owned IT assets.
C. accessing the Internet and surfing the Web.
D. clicking on unknown e-mail attachments and files.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started