Test Information
Description This is the final exam that will consist of 50 multiple choice and true/false questions. Please
select the most important response for each question. You will have 2 attempts with the highest
grade being accepted as final.
Instructions
Multiple This test allows 2 attempts. This is attempt number 2.
Attempts
Force This test can be saved and resumed later.
Completion
Question Completion Status:
Question 1
1. There are several types of domains in the IT infrastructure. Which of the following is not one of
these domains?
A. user
B. workstation
C. remote access
D. VPN
2 points
Question 2
1. Policies and standards are a collection of concrete definitions that describe acceptable and
unacceptable human behavior. The questions related to are more appropriate for
procedures or guidelines than policies or standards, which require detail that is more at the level
of .
where, when and how; what and why
how; what
where and when; what, who and why
where, when, and how; what, who, and why
2 points
, OS FINAL
Question 3
1. Though there are many ways to group security policies, a common method is to organize
common risks and related policy issues into that share similarities but are distinctive
enough to allow logical separation into more manageable secure areas.
A. segmented networks
B. system access policies
C. domains
D. workstations
2 points
Question 4
1. Of the eight classic personality types in the workplace, commanders, can often appear angry or
even hostile toward ideas and others on the team and are critical of others’ ideas.
True
False
2 points
Question 5
1. in e-commerce broadly deals with creating rules on how to handle a
consumer’s transaction and other information.
A. Security controls
B. Consumer rights
C. Personal privacy
D. Shareholder rights
, OS FINAL
2 points
Question 6
1. describes how to design and implement an information security governance
structure, whereas describes security aspects for employees joining,
moving within, or leaving an organization.
A. Human resources security, organization of information security
B. Information security policy, organization of information security
C. Organization of information security, human resources security
D. Human resources security, asset management
2 points
Question 7
1. Security controls are measures taken to protect systems from attacks on the integrity, confidentiality,
and availability of the system. If a potential employee is required to undergo a drug screening,
which of the following controls is being conducted?
A. preventive security controls
B. technical security controls
C. physical security controls
D. administrative controls
2 points
Question 8
1. is a measurement that quantifies how much information can be transmitted over
the network.
Memory
DMZ