The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 314 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
1. (TCO A) Risk management is a _______.
      business process
Â
      security process
Â
      technology process
Â
      system life cycle process
Â
      human process
Â
Question 2. 2. (TCO A) Security controls protect ______.
      facilities
Â
      people
Â
      information
Â
      computers and networks
Â
      All of the above
Â
Question 3. 3. (TCO B) Administrative controls are beneficial because they ________.
      are based on laws, orders, and directives
Â
      document management intent
Â
      define security requirements
Â
      are available to nontechnical people
Â
      All of the above
Â
Question 4. 4. (TCO B) Administrative controls ________.
      are based on laws, orders, and directives
Â
      document management's intent
Â
      define security requirements
Â
      are understandable to nontechnical people
Â
      All of the above
Â
Question 5. 5. (TCO C) The authority to use an information asset is called ______.
      authentication
Â
      access
Â
      authorization
Â
      nonrepudiation
Â
      access control list
Â
Question 6. 6. (TCO C) A digital signature that is correctly applied to a message is ________.
      a function of the creator of the message
Â
      a function of the public key of the user who signs a message
Â
      independent of the message that is signed
Â
      the same for every message signed by an individual
Â
      a three-factor authentication method
Â
Question 7. 7. (TCO D) Physical and environmental security does not include controls for _______.
      facility access
Â
      fire safety
Â
      plumbing leaks
Â
      theft
Â
      personal integrity
Â
Question 8. 8. (TCO E) Which is not a reasonable criterion for segmenting a Computer Security Awareness and Training (CSAT) program?
      Age
Â
      Job
Â
      Knowledge
Â
      Technology
Â
      Expertise
Â
Question 9. 9. (TCO E) Security category is composed of ________.
      the impact of unauthorized disclosure
Â
      the risk of unauthorized disclosure
Â
      the risk of loss of confidentiality, integrity, and availability for a data type
Â
      the impact of loss of confidentiality, integrity, and availability for a data type
Â
      a data type
Â
Question 10. 10. (TCO F) Adversaries may be ______.
      competitors
Â
      employees
Â
      news reporters
Â
      thrill seekers
Â
      All of the above
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly