Which of the following is a viable method of dealing with internal
security threats?
Select one:
A.Policies regarding what computing resources are accessible to whom
B.Antivirus software
C.Firewalls
D.Policies that mandate frequent updates to programs and such
E.Not immediately deleting terminated employees - ANSWERS-A.
Policies regarding what computing resources are accessible to whom
When a company is faced with a security threat, they have which three
strategies available to them?
Select one:
A.Acceptance, reduction, and transference
B.Acceptance, avoidance, and transference
C.Avoidance, reduction, and transference
D.Acceptance, avoidance, and reduction
E.All of the choices are correct - ANSWERS-A.
Acceptance, reduction, and transference
END OF
PAGE
1
, ISDS 3001 FINAL LATEST
The difference between cybersecurity and privacy is that whereas
cybersecurity is about safe keeping of collected data, privacy is about
informed consent and permission to collect and use identifying
information.
Select one:
True
False - ANSWERS-True
Why is a Trojan horse not a virus?
Select one:
A.It does not self-replicate
B.It does not have a payload
C.It does not have a trigger event
D.It is a legitimate form of security protection
E.It does not do anything harmful - ANSWERS-A.
It does not self-replicate
Many organizations limit their employees' access to certain websites and
prevent the individual installation of new software. Which of the
following best describes this practice?
Select one:
END OF
PAGE
2
, ISDS 3001 FINAL LATEST
A.Mitigating internal threats through monitoring
B.Detecting internal threats through monitoring
C.Detecting external threats through monitoring
D.Answer is not listed - ANSWERS-A.
Mitigating internal threats through monitoring
Which of the following is an automated method of seeking passwords?
Select one:
A.Phishing
B.Social Engineering
C.Software bugs
D.Backdoors
E.Careless behavior - ANSWERS-A.
Phishing
Risk Audit provides the basis for:
Select one:
A.Risk Analysis
B.Risk Reduction
END OF
PAGE
3
, ISDS 3001 FINAL LATEST
C.Risk Transference
D.Reward Mechanism
E.Risk increase - ANSWERS-A.
Risk Analysis
Security should be on managers' priority list because of peculiar
characteristics that run the risk of leaving it what?
Select one:
A.Underfunded
B.Overfunded
C.Overstaffed
D.Irrelevant
E.Neutralized - ANSWERS-A.
Underfunded
What is the top-level position in the IT function?
Select one:
A.Architect
B.Chief Information Officer (CIO)
END OF
PAGE
4