Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Exam ALL ANSWERS 100% CORRECT AID GRADE ‘A’

Beoordeling
-
Verkocht
-
Pagina's
16
Cijfer
A+
Geüpload op
28-06-2021
Geschreven in
2020/2021

• Question 1 One of the processes designed to eradicate maximum possible security risks is to , which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals. Selected Answer: hard en Correct Answer: hard en • Question 2 0 out of 2 points One of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an organization? Selected Answer: systems administrators Correct Answer: security personnel • Question 3 2 out of 2 points Which of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning? Selected Answer: security personnel Correct Answer: security personnel • Question 4 Imagine a scenario in which an employee regularly shirks the 0 out of 2 points organization’s established security policies in favor of convenience. What does this employee’s continued violation suggest about the culture of risk management in the organization? Selected Answer: that the employee requires further training to gain a deeper knowledge of the policies Correct Answer: that the organization lacks a good risk culture wherein employees have “buy in” • Question 5 0 out of 2 points Which of the following user groups has both the business needs of being able to access the systems, network, and application to complete contracted services, and access capability that is limited to particular sections of the systems, network, and application? Selected Answer: guests and general public Correct Answer: vendors • Question 6 2 out of 2 points Security policies that clarify and explain how rights are assigned and approved among employees can ensure that people have only the access needed for their jobs. Which of the following is not accomplished when prior access is removed? Selected Answer: minimizes future instances of human error Correct Answer: minimizes future instances of human error • Question 7 0 out of 2 points Aside from human user types, there are two other non-human user groups. Known as account types, are accounts implemented by the system for the purpose of supporting automated service, and are accounts that remain non-human until individuals are assigned access and can use them to recover a system following a major outage. Selected Answer: control partners, system accounts Correct Answer: system accounts, contingent IDs • Question 8 2 out of 2 points Which of the following is the most important reason why data needs to be both retrievable and properly stored? Selected Answer: Companies need to maintain data or the purpose of keeping an audit trail. Correct Answer: Companies need to maintain data or the purpose of keeping an audit trail. • Question 9 0 out of 2 points There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is not an automated control? Selected Answer: network segmentation Correct Answer: log reviews • Question 10 0 out of 2 points One of the different manual controls necessary for managing risk is , which is a type of formal management verification. In the process, management confirms that a condition is present and that security controls and policies are in place. Selected Answer: background checks Correct Answer: attestation • Question 11 2 out of 2 points The information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies to be executed, they occupy role of . Selected Answer: Correct subject matter expert (SME) Answer: subject matter expert (SME) • Question 12 0 out of 2 points are responsible for the monitoring of activities the pre, middle, and post stages of goal implementation, whereas are responsible for the monitoring of activities following the implementation and are called upon to evaluate whether or not the goals have been achieved. Selected Answer: Project committees, management committees Correct Answer: Management committees, government committees • Question 13 2 out of 2 points The executive management has the responsibility of connecting many lines of business to bring resolution to strategy business issues. However, their ultimate responsibility is to . Selected Answer: enforce policies at the executive and enterprise levels Correct Answer: enforce policies at the executive and enterprise levels • Question 14 0 out of 2 points There are number of issues to consider when composing security policies. One such issue concerns the use of security devices. One such device is a , which is a network security device with characteristics of a decoy that serves as a target that might tempt a hacker. Selected Answer: threat vector Correct Answer: honeypot • Question 15 0 out of 2 points A is an apparatus for risk management that enables the organization to comprehend its risks and how those risks might impact the business. Selected Answer: risk mitigation assess self-assessment (RMASA) Correct Answer: risk and control self-assessment (RCSA) • Question 16

Meer zien Lees minder
Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
28 juni 2021
Aantal pagina's
16
Geschreven in
2020/2021
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Allan100 Rasmussen College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
647
Lid sinds
5 jaar
Aantal volgers
605
Documenten
3226
Laatst verkocht
4 dagen geleden

3.5

92 beoordelingen

5
36
4
17
3
15
2
5
1
19

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen