Ch.14 Flashcards

1
Q

What concept below is at the very heart of information security?

Question 1 options:

threat

mitigation

risk

management

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due to the potential impact of changes that can affect all users in a organization, and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?

Question 2 options:

change management team

incident response team

security control team

compliance team

A

change management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What may be defined as the components required to identify, analyze, and contain an incident?

Question 3 options:

Vulnerability response

Incident response

Risk response

Threat response

A

Incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization?

Question 4 options:

Incident reporting

Incident management

Incident handling

Incident planning

A

Incident management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A written document that states how an organization plans to protect the company’s information technology assets is a:

Question 5 options:

security policy

guideline

security procedure

standard

A

security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of suggestions that should be implemented are referred to as a:

Question 6 options:

security policy

baseline

guideline

security procedure

A

guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select below the option that best describes a policy:

Question 7 options:

A collection of requirements specific to the system or procedure that must be met by everyone

A collection of suggestions that should be implemented

A list of all items that have a positive economic value

A document that outlines specific requirements or rules that must be met

A

A document that outlines specific requirements or rules that must be met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?

Question 8 options:

Acceptable use policies

Encryption policies

Data loss policies

VPN policies

A

Acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of policy outlines how organizations use personal information it collects?

Question 9 options:

VPN

network

encryption

privacy

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policies that include statements regarding how an employee’s information technology resources will be addressed are part of a:

Question 10 options:

VPN policy

acceptable use policy

security-related human resource policy

technical policy

A

security-related human resource policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person’s fundamental beliefs and principals, which are used to define what is good, and how to distinguish right from wrong, are collectively called a person’s:

Question 11 options:

Morals

Values

Ethics

Standards

A

Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are values that are attributed to a system of beliefs that help the individual distinguish right from wrong called?

Question 12 options:

Morals

Ethics

Standards

Morays

A

Morals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can be defined as the study of what a group of people understand to be good and right behavior and how people make those judgments?

Question 13 options:

Values

Morals

Ethics

Standards

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of network below uses a direct connection between users, and involves each device simultaneously acting as a client and a server?

Question 14 options:

Peer

Client-server

P2P

Share

A

P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Websites that group individuals and organizations into clusters or groups based on some sort of affiliation are considered to be what type of websites?

Question 15 options:

social networking

social engineering

social management

social control

A

social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which term below describes the art of helping an adult learn?

Question 16 options:

andragogical

pedagogical

deontological

metagogical

A

andragogical

17
Q

What kind of learners learn from taking notes, being at the front of the class, and watching presentations?

Question 17 options:

Kinesthetic

Auditory

Spatial

Visual

A

Visual

18
Q

What type of learner tends to sit in the middle of the class and learns best through lectures and discussions?

Question 18 options:

Visual

Auditory

Kinesthetic

Spatial

A

Auditory

19
Q

What type of learner learns best through hands-on approaches?

Question 19 options:

Visual

Auditory

Kinesthetic

Spatial

A

Kinesthetic

20
Q

What is the most common type of P2P network?

Question 20 options:

​Kazaa

​Bittorrent

​eDonkey

​Sneakernet

A

​Bittorrent