SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 314 Weeks Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 20 Nov 2017 My Price 9.00

Physical and environmental security does not include controls

1. (TCO A) Risk management is a _______.

      business process

 

      security process

 

      technology process

 

      system life cycle process

 

      human process

 

Question 2. 2. (TCO A) Security controls protect ______.

      facilities

 

      people

 

      information

 

      computers and networks

 

      All of the above

 

Question 3. 3. (TCO B) Administrative controls are beneficial because they ________.

      are based on laws, orders, and directives

 

      document management intent

 

      define security requirements

 

      are available to nontechnical people

 

      All of the above

 

Question 4. 4. (TCO B) Administrative controls ________.

      are based on laws, orders, and directives

 

      document management's intent

 

      define security requirements

 

      are understandable to nontechnical people

 

      All of the above

 

Question 5. 5. (TCO C) The authority to use an information asset is called ______.

      authentication

 

      access

 

      authorization

 

      nonrepudiation

 

      access control list

 

Question 6. 6. (TCO C) A digital signature that is correctly applied to a message is ________.

      a function of the creator of the message

 

      a function of the public key of the user who signs a message

 

      independent of the message that is signed

 

      the same for every message signed by an individual

 

      a three-factor authentication method

 

Question 7. 7. (TCO D) Physical and environmental security does not include controls for _______.

      facility access

 

      fire safety

 

      plumbing leaks

 

      theft

 

      personal integrity

 

Question 8. 8. (TCO E) Which is not a reasonable criterion for segmenting a Computer Security Awareness and Training (CSAT) program?

      Age

 

      Job

 

      Knowledge

 

      Technology

 

      Expertise

 

Question 9. 9. (TCO E) Security category is composed of ________.

      the impact of unauthorized disclosure

 

      the risk of unauthorized disclosure

 

      the risk of loss of confidentiality, integrity, and availability for a data type

 

      the impact of loss of confidentiality, integrity, and availability for a data type

 

      a data type

 

Question 10. 10. (TCO F) Adversaries may be ______.

      competitors

 

      employees

 

      news reporters

 

      thrill seekers

 

      All of the above

Answers

(5)
Status NEW Posted 20 Nov 2017 12:11 PM My Price 9.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)