SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Engineering Posted 11 Oct 2017 My Price 10.00

-Hubs are better than switches because switches increase the risk of sniffing attacks.

1-Hubs are better than switches because switches increase the risk of sniffing attacks.

 a.True

 b.False

 

2-What is the primary reason to avoid risk?

a.Risks create vulnerabilities and threats.

b.The impact of the risk outweighs the benefit of the asset.

c.Risks are easily exploited.

d.Risks can destroy a business.

 

3.Survivability = Risks + Costs

 a.True

 b.False

 

4.As a top-level executive at your own company, you are worried that your employees may steal confidential data too easily by downloading and taking home data onto thumb drives. What is the best way to prevent this from happening?

a.Install a technical control to prevent the use of thumb drives.

b.Instruct higher level employees to inform their employees that the use of a thumb drive is a fireable offense.

c.Hold a seminar that explains to employees why the use of thumb drives in the workplace is a security hazard

d.enforce a written company policy against the use of thumb drives, and install a technical controls on the computers that will prevent the use of thumb drives.

 

5.Balanced security satisfies everyone.

 a.True

b. False

 

6.What is the best example of warez?

a.software

b.hardware

c.a file on your computer of tonight's new Game of Thrones episode you downloaded for free

d.an MP3 file of a new Cage the Elephant single you bought with iTunes money

 

7.Out-of-pocket costs are costs to reduce risks that a company CEO must pay for with his own money rather than the company's funds.

 True

 False

 

8.A(n) _________ is the process of creating a list of threats.

a.threat identification

b.threat assessment

c,risk assessment

d.risk identification

 

9.The ultimate goal in risk management is to protect the organization.

a. True

 b.False

 

10Risk __________ is the practice of identifying, assessing, controlling, and mitigating risks.

a.assessment

b.mitigation

c.management

d.evaluation

 

11.A loss results in a compromise to business functions, and a threat results in a compromise to business assets.

 a.True

b. False

 

12.What is NOT a step in risk management?

a.taking steps to reduce risk to an accepted level

b.identifying risks

c.assessing risks

d.eliminating all risks

 

13.Profitability = Revenue - Costs

a. True

b. False

 

14.CBK stands for Cost Benefit Knowledge.

 a.True

 b.False

 

15Companies use risk management techniques to differentiate ___________ from _________?

vulnerabilities,

a. threatsvulnerabilities,

b.weaknessessevere risks,

c.minor riskscosts,

4.benefits

 

16.When a threat exploits a vulnerability, it results in a(n) __________.

a.impact

b.loss

c.crime

d.liability

 

17.Risk sharing shifts a portion of the responsibility or liability.

 a.True

 b.False

Attachments:

Answers

(5)
Status NEW Posted 11 Oct 2017 11:10 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)