CYB 260 5-1 Reading Quiz
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
260
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
6
Uploaded by salarid
Question 1 1/ 1 point Which of the following are characteristics of procedures? Broad scope, address whole organization, very rarely change Support high-level policies, set minimum standards of behavior Very rarely change, set forth general expectations ) Step-by-step checklists, explain how to meet security goals, be flexible and change as technology changes Question 2 1/ 1 point What kind of policy would contain a no-retaliation element? Acceptable use @) Anti-harassment Intellectual property Authentication Question 3 1/ 1 point Which law requires each federal agency to develop an information security program? GLBA HIPAA o) FISMA FERPA
Question 4 1/ 1 point Which role identifies the person in an organization who has the senior-most role in protecting information security? ) CISO CFO Clo CTO Question 5 1/1 point Aformal __________is executive management’s high-level statement of information security direction and goals. » ) Policy Standard Guideline Procedure Question 6 1/ 1 point Many organizations have a(n) __________. , which consists of end-user devices (including tablets, laptops, and smartphones) on a shared network that use distributed system software; this enables these devices to function simultaneously, regardless of location. Agent o) Distributed infrastructure Executive management sponsorship Agentless central management tool
Question 7 1/ 1 point Which of the following describes a centrally located device that is capable and permitted to extend and connect to distributed services? Inventory assessment ' Agentless central management tool Distributed infrastructure Malware tool Question 8 1/ 1 point Which of the following is not one of the outcomes of a wide acceptance of security awareness among employees? ‘When employees understand the relationship between their policies and their work, they are inclined to consider them worthwhile. o Employees who have accepted security policies distinguish themselves from others in the organizational culture. Wide acceptance of security policies results in fewer security incidents. Employees are more inclined to accept what they understand. Question 9 1/ 1 point Which of the following is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives? Threat vector Communications plan Agent profile o Target state Question 10 0/ 1 point Which of the following illustrates an ideal time to implement security policies in order to gain the maximum level of organizational commitment? The policies should be implemented following a new product launch. The policies should be implemented at the same time of a new product launch. The policies should be implemented to coincide with audit findings in order to minimize security risks. ») The policies should be implemented at the same time the new customer service policies are introduced.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help