.

Saturday, January 19, 2019

FINAL EXAM: Study Guide Essay

1. Which of the following(a) is an action that could damage an addition?2. Which impartiality requires all types of financial institutions to protect customers private financial study?3. An AUP is part of a forgeed approach to security system, and it supports confidentiality. What else supports confidentiality?4. Which of the following is a diminutive written definition of how software and hardware are to be utilize?5. Which of the following is not a common type of data assortment standard?6. What does a lapse in a security statement or policy create?7. Which of the following is any flea-bittenness in a body that makes it possible for a threat to cause it persecute?8. Which of the following terms refers to the likelihood of exposure to danger?9. Which type of assailant intends to be helpful?10. Which domain is primarily fall uponed by weak endpoint security on a VPN client?11. direct both phases of the entry cook process.12. You log onto a network and are asked to leave a combination of elements, such as user name, password, token, smart card, or biometrics.This is an example of which of the following?13. Which of the following is a type of authentication?14. pick out an example of an access control formal model.15. Which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition?16. Which of the following are prime categories of rules that close organizations must comply with?17. Which of the following is not a part of an commonplace IT security policy framework?18. Which of the following helps you determine the appropriate access to classified data?19. Which of the following refers to the management of baseline settings for a formation device?20. Identify a primary step of the SDLC.21. Which of the following is a process to verify policy compliance?22. When monitoring a system for anomalies, the system is measured against _.23. Which of the following is not a type of perspicac ity test?24. Identify a draw masking of log monitoring.25. Which of the following is not a type of monitoring device?26. Identify the primary components of risk management.27. Which of the following is not a part of a quantitative risk discernment?28. What are the primary components of occupation continuity management (BCM)?29. Which of the following determines the consummation of the impact that a particular incident would have on business operations over time?30. What does risk management directly affect?31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A?32. Identify a security objective that adds value to a business.33. Which of the following is an asymmetric encryption algorithm?34. Identify a security principle that can be satisfied with an asymmetric digital touch sensation and not by a symmetric signature.35. Which of the following is a mechanics for accomplishing confidentiality, integrity, authentication, and nonrepudiation?36. In which OSI layer do you find FTP, HTTP, and other weapons platforms that end users act with?37. Identify the configuration that is best for networks with varying security levels, such universal users, a group of users working on a secret investigate project, and a group of executives.38. Which of the following would you not expect to find on a large network?39. Which of the following is a weakness of WLANs?40. Identify an advantage of IPv6 over IPv4.41. Identify one of the first estimator viruses to pop in the world.42. Which of the following is not a primary type of computer attack?43. How do worms propagate to other systems?44. Which of the following type of program is also commonly referred to as a Trojan horse?45. Which defense-in-depth layer involves the use of chokepoints?46. How does a standard differ from a compliance rightfulness?47. Which of the following is not a principle of the PCI DSS?48. Identify the complianc e law that requires adherence to the minimum necessary rule.49. Identify the compliance law whose primary goal is to protect investors from fi nancial fraud. 50. U.S. organizations must comply with

No comments:

Post a Comment