Liberty University CSIS 340 Final Exam Questions & Answers.
The domain connects an organizations private network to the Internet?
Selected
... [Show More] Answer:
LAN-to- WAN
• Question 2
0 out of 2 points
To promote cultural change, the goal should be to make security policies ?
Selected Answer:
Be reviewed every two years
• Question 3
2 out of 2 points
Without sponsorship, users will be less likely to eagerly participate in awareness training.
Selected Answer:
Executive management
• Question 4
2 out of 2 points
What needs do organizations have to classify data?
Selected Answer:
To protect and recover information
• Question 5
The Security Compliance Committee ?
2 out of 2 points
Selected Answer:
Approves controls for compliance
• Question 6
Web Services policies would be an example of domain.
2 out of 2 points
Selected WA
Answer: N
• Question 7
2 out of 2 points
Production data should be before being used in a test environment?
Selected Answer:
Sanitiz ed
• Question 8
2 out of 2 points
Which of the following includes guidelines under the LAN domain policies?
Selected Answer:
IDS and IPS architecture and management
• Question 9
Which of the following is a common cause of security breaches?
2 out of 2 points
Selected Answer:
Inadequate management and user decisions
• Question 10
What is a strong indicator that awareness training is not effective?
2 out of 2 points
Selected Answer:
Sharing your password with a supervisor
• Question 11
Baseline standards for the LAN domain would include .
2 out of 2 points
Selected Answer:
Wi-Fi access points
• Question 12
2 out of 2 points
Which of the following is not an organizational challenge when implementing security policies?
Selected Answer:
Fiscal surplus
• Question 13
2 out of 2 points
The model was the first model developed to address the concerns of integrity. Originally published in 1977
Selected Answer:
Bib a
• Question 14
2 out of 2 points
occurs when you manipulate or trick a person into weakening the security of an organization?
Selected Answer:
Social engineering
• Question 15
2 out of 2 points
Data in transit refers to what type of data?
Selected Answer:
Data traversing a network
• Question 16
2 out of 2 points
Simple security policy awareness requires that report suspicious activity?
Selected Answer:
All of the above
• Question 17
2 out of 2 points
A business impact analysis requires an impact report, component reliance, and a .
Selected Answer:
component priority
• Question 18
2 out of 2 points
techniques can provide a security baseline for full operating systems and applications?
Selected Answer:
Imagin g
• Question 19
2 out of 2 points
A standard describes the requirements for obtaining a domain name for use by external parties?
Selected Answer:
DNS
control
• Question 20
2 out of 2 points
A(n) has an easier time bypassi [Show Less]