Quiz 13 Flashcards

1
Q

Survivable Network Analysis begins with what assumption?

Question 1 options:

that an effective security policy can reduce risks to zero

that your network will be attacked

that the probability of threats is increasing constantly

that you have laid the groundwork for a risk analysis

A

that your network will be attacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To determine the value of hardware and software you need to protect, which of the
following approaches is easiest to use?
Question 2 options:

keeping records of purchase costs

interviewing support personnel

using your experience and expertise

getting the most recent prices online

A

interviewing support personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should an organization conduct a new round of risk analysis?

Question 3 options:

every three months

when equipment or staff change significantly

as frequently as possible

every month

A

when equipment or staff change significantly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A risk analysis report should call attention to .

Question 4 options:

the newest risks

the most urgent risks

the risks that are easiest to manage

all identified risks

A

all identified risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ultimate goal of a security policy is which of the following?

Question 5 options:

none of the above

reducing the risks to zero

convincing management that the IT budget should be increased

doing it right the first time so the policy does not have to be rewritten constantly

A

none of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the hardware, software, and informational resources you need to protect?

Question 6 options:

threats

tangibles

assets

business holdings

A

assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

nsuring that databases remain accessible if primary systems go offline is known
as .
Question 7 options:

fault tolerance

resiliency

failover

redundancy

A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following technologies helps protect sensitive data even after it has been
stolen from a secured medium?
Question 8 options:

virus protection

encryption

authentication

Spybot

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following sections of a security policy affects the most people in an
organization?
Question 9 options:

incident handling policy

acceptable use policy

privileged access policy

remote access policy

A

acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an escalation procedure? (Choose all that apply.)

Question 10 options:

A) It identifies employees who should be involved in the response.

B) It describes how network security can be improved in stages.

C) It describes how a virus can multiply and affect more assets.

D) It describes different levels of response based on incident severity.

A

It describes different levels of response based on incident severity.

It identifies employees who should be involved in the response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following, if worded correctly, can protect companies from wrongful
termination lawsuits?
Question 11 options:

penalty clauses

nondisclosure clauses

acceptable use policies

punitive clauses

A

penalty clauses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A password policy might specify which of the following attributes for password selection?

Question 12 options:

length requirements

frequency for changing passwords

all of the above

complexity requirements

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following provides employees with formal instructions about the
organization’s security strategy?
Question 13 options:

risk assessment

acceptable use policy

security user awareness program

strategy meeting

A

security user awareness program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If organizations have employees who connect remotely, which of the following security
concerns should be considered?
Question 14 options:

all of the above

the possibility of mobile devices being stolen

the use of updated, effective antivirus and firewall software on mobile devices or home systems that connect to the network

virus infections spreading from home and mobile systems to corporate system

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A password policy should be established in the and enforced by
whenever possible.
Question 15 options:

company employee handbook, security guards

company Web site, network administrators

risk assessment process, management

security policy, software

A

security policy, software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly