The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 305 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Hello, I need help in my Intro Info System Security course IS211.
Thank you,
What are the three components of the CIA triangle? Â What are they used for?
Â
QUESTION 2
Who is ultimately responsible for the security of information in the organization? (Select all that apply)
|
|
 |
CISO |
|
|
 |
CIO |
|
|
 |
CEO |
|
|
 |
CFO |
Â
QUESTION 3
Why do employees constitute one of the greatest threats to information security?
Â
QUESTION 4
Is privacy a freedom from any observation?
 True
 False
Â
QUESTION 5
What is risk management? (Seelct all that apply)
|
|
 |
Identifying vulnerabilities in an organization’s information systems |
|
|
 |
Taking steps to ensure the confidentiality, integrity, and availability of all the components in the organization’s information system. |
|
|
 |
Procure new security tools |
|
|
 |
Outsource risk to security vendor to prevent and mitigate |
Â
QUESTION 6
What are vulnerabilities?
|
|
 |
A flaw or weakness in an information asset, security procedure, design, or control that could be exploited accidentally or on purpose to breach security. |
|
|
 |
Threat agents ability to access secure data |
|
|
 |
Robust and well tested software |
|
|
 |
A strength within an IT asset. |
Â
QUESTION 7
What documents are available from the NIST Computer Resource Center?
|
|
 |
SP 800-12: An Introduction to Computer Security: The NIST Handbook |
|
|
 |
SP 800-14: Generally Accepted Security Principles and Practices for Securing Information Technology Systems |
|
|
 |
SP 800-18 Rev. 1: Guide for Developing Security Plans for Federal Information Systems |
|
|
 |
SP 800-26: Security Self-Assessment Guide for Information Technology Systems |
|
|
 |
All the above |
Â
QUESTION 8
Who is ultimately responsible for managing a technology? (Select all that apply)
|
|
 |
Senior Management. |
|
|
 |
Everyone in a supervisory position. |
|
|
 |
Your manager |
|
|
 |
The guy in the mailroom |
Â
QUESTION 9
Select the various types of firewalls work at what levels of the OSI model? (Select all that apply)
|
|
 |
Packet filtering firewalls scan network data at Layer 3, of the OSI model. |
|
|
 |
MAC layer firewalls are designed to operate at the media access control layer (layer 2) of the OSI model. |
|
|
 |
Application level firewalls will operate at OSI layers below layer 3. |
|
|
 |
Session based firewalls work at layer 5 |
Â
QUESTION 10
 A common security system is an IDPS most like a burglar alarm
 True
 False
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly