10.7.7 Practice Questions Flashcards

1
Q

Question 1.
Which of the following is a policy that defines appropriate and inappropriate usage of company resources, assets, and communications?

answer
Business impact analysis (BIA)
Acceptable use policy (AUP)
Business continuity plan (BCP)
Disaster recovery plan (DRP)

A

Correct Answer:
Acceptable use policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 2.
Which of the following BEST describes an acceptable use agreement?

answer
-An agreement that prohibits an employee from working for a competing organization for a specified period of time after he or she leaves the organization.
-An agreement that identifies employees’ rights to use company property, such as internet access and computer equipment, for personal use.
-A legal contract between the organization and the employee that specifies that the employee is not to disclose the organization’s confidential information.
-An agreement that outlines the organization’s monitoring activities.

A

Correct Answer:
An agreement that identifies employees’ rights to use company property, such as internet access and computer equipment, for personal use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 3.
Which of the following could be an example of a malicious insider attack?

answer
-A user has not implemented appropriate security settings.
-A user uses the built-in microphone to record conversations.
-A user’s device has become infected with malware.
-A user has lost a company-owned device.

A

Correct Answer:
A user uses the built-in microphone to record conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 4.
Which device deployment model gives businesses significant control over device security while allowing employees to use their devices to access both corporate and personal data?

answer
VDI
BYOD
COPE
CYOD

A

Correct Answer
COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 5.
You are the IT Security Manager at a mid-sized company. The company has recently adopted a bring your own device (BYOD) policy.
One of your employees, John, has been using his personal device for work-related tasks. John’s device gets infected with malware, which he unknowingly connects to the company’s network. As a result, the malware spreads across the network, compromising sensitive data.
As the IT Security Manager, what should be your immediate course of action?

answer
-Disconnect John’s device from the network, isolate the affected systems, and start an investigation to understand the extent of the damage.
-Ignore the issue as it’s John’s personal device and not the company’s responsibility.
-Immediately fire John for causing a security breach.
-Publicly blame John for the incident to set an example for other employees.

A

Correct Answer:
Disconnect John’s device from the network, isolate the affected systems, and start an investigation to understand the extent of the damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 6.
Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on company-owned tablets. These tablets contain sensitive information. If one of these tablets is lost or stolen, this information could end up in the wrong hands.
The chief information officer wants you to implement a solution that can be used to keep sensitive information from getting into the wrong hands if a device is lost or stolen.
Which of the following should you implement?

answer
An acceptable use policy (AUP)
A mobile device management (MDM) infrastructure
A guest wireless network that is isolated from your organization’s production network
A network access control (NAC) solution

A

Correct Answer:
A mobile device management (MDM) infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 7.
If a user’s BYOD device (such as a tablet or phone) is infected with malware, that malware can be spread if that user connects to your organization’s network. One way to prevent this event is to use a network access control (NAC) system.
How does an NAC protect your network from being infected by a BYOD device?

answer
The NAC forces BYOD devices to connect to a guest network that is isolated from your production network.
The NAC remediates devices before allowing them to connect to your network.
The NAC specifies which apps can be used while the BYOD device is connected to the organization’s network.
The NAC notifies users that personally owned devices are subject to random searches if brought on site.

A

Correct Answer:
The NAC remediates devices before allowing them to connect to your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 8.
The IT manager has tasked you with implementing a solution that ensures that mobile devices are up to date, have anti-malware installed, and have the latest definition updates before being allowed to connect to the network.
Which of the following should you implement?
answer
MDM
BYOD
NAC
VDI

A

Correct Answer:
NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 9.
Users in the sales department perform many of their daily tasks, such as emailing and creating sales presentations, on their personal tablets.
The chief information officer worries that one of these users might also use their tablet to steal sensitive information from the organization’s network. Your job is to implement a solution that prevents insiders from accessing sensitive information stored on the organization’s network from their personal devices while still giving them access to the internet.
Which of the following should you implement?

answer
A guest wireless network that is isolated from your organization’s production network
A network access control (NAC) solution
An acceptable use policy (AUP)
Incorrect answer:
A mobile device management (MDM) infrastructure

A

Correct Answer:
A guest wireless network that is isolated from your organization’s production network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 10.
At a large tech company, the IT department explored options to accommodate employees who prefer using their own devices for work purposes. The management understands that embracing such a policy can improve productivity and job satisfaction.
They consider two strategies: bring your own device (BYOD) and choose your own device. The IT team evaluated the benefits and risks associated with each approach.
Which of the following statements about BYOD and CYOD are correct? (Select two.)

answer
-Bring your own device (BYOD) allows businesses to purchase devices at significant discounts.
-Choose your own device provides employees with the freedom to select any device for work, regardless of security concerns.
-Bring your own device and choose your own device have the same level of control and management by the IT department.
-Choose your own device limits device choices to a predefined list of approved options.
-Bring your own device allows employees to use their personal devices for work purposes.

A

Correct Answer:
Choose your own device limits device choices to a predefined list of approved options.

Correct Answer:
Bring your own device allows employees to use their personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly