CSIS 340 FINAL EXAM PREP Questions With Answers ALL VERIFIED GRADED A+
CSIS 340 FINAL EXAM PREP Questions With Answers ALL VERIFIED GRADED A+ Question 1 2 out of 2 points Of all the reasons that people commit errors when it comes to IT security, which of the following is the main reason people make mistakes? Selected Answer: carelessne ss Correct Answer: carelessne ss Question 2 2 out of 2 points Which of the following statements does not offer an explanation of what motivates an insider to pose a security risk? Selected Answer: An individual might think that threatening to disclose security information will earn the attention and recognition from the organization and thus result in promotion. Correct Answer: An individual might think that threatening to disclose security information will earn the attention and recognition from the organization and thus result in promotion. Question 3 2 out of 2 points Which of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning? Selected Answer: security personnel Correct Answer: security personnel Question 4 2 out of 2 points There are many ways that people can be manipulated to disclose knowledge that can be used to jeopardize security. One of these ways is to call someone under the false pretense of being from the IT department. This is known as _________________________. Selected Answer: pretexti ng Correct Answer: pretexti ng Question 5 2 out of 2 points One of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an organization? Selected Answer: security personnel Correct Answer: security personnel Question 6 2 out of 2 points It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring can deter risk. To serve this goal, a ________________ can be used to assemble logs from platforms throughout the network. Selected Answer: log server Correct Answer: log server Question 7 2 out of 2 points Consider this scenario: A company that buys a sizeable amount of equipment for its manufacturing process needs to accurately report such expenditures, so it calls upon the services of financial auditors. While financial auditors might consider how robust the data might be, the company might also involve IT auditors to examine the technology in place to gather the data itself. What process is this company using to address its concerns? Selected Answer: integrated audit Correct Answer: integrated audit Question 8 2 out of 2 points It is necessary to retain information for two significant reasons: legal obligation and business needs. Data that occupies the class of ________________ is comprised of records that are required to support operations; the data included might be customer and vendor records. Selected Answer: busine ss Correct Answer: busine ss Question 9 2 out of 2 points Despite the fact that there exists no mandatory scheme of data classification for private industry, there are four classifications used most frequently. Which of the following is not one of the four? Selected Answer: moderately sensitive Correct Answer: moderately sensitive**************************************************************************************DOWNLOAD TO SCORE A+
Geschreven voor
- Instelling
- Liberty University
- Vak
- CSIS 340 (CSIS340)
Documentinformatie
- Geüpload op
- 22 april 2021
- Aantal pagina's
- 96
- Geschreven in
- 2020/2021
- Type
- Tentamen (uitwerkingen)
- Bevat
- Onbekend
Onderwerpen
-
csis 340 final exam prep questions with answers all verified graded a
-
of all the reasons that people commit errors when it comes to it security
-
which of the following is the main reason people mak