CIS_462_Midterm ALL ANSWERS 100% CORRECT AID GRADE ‘A’
In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a , which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites. Selected Answer: demilitarized zone (DMZ) Correct Answer: demilitarized zone (DMZ) A(n) sets expectations on the use and security of mobile devices, whereas a(n) establishes a broad set of rules for approved conduct when a user accesses information on company-owned devices. Selected Answer: corporate mobility policy, acceptable use policy Correct Answer: corporate mobility policy, acceptable use policy Using switches, routers, internal firewalls, and other devices, you can restrict network traffic with a , which limits what and how computers are able to talk to each other. Selected Answer: segmented network Correct Answer: segmented network Authentication of a workstation and encryption of wireless traffic are issues that belong to which of the following two domains? Selected Answer: workstation and LAN Correct Answer: workstation and LAN Remote authentication has always been a concern because the person is coming from a public network, and many companies require two-factor authentication for remote access. Which of the following is not one of the most commonly accepted types of credentials? Selected Answer: something you want to know Correct Answer: something you want to know Though there are many ways to group security policies, a common method is to organize common risks and related policy issues into that share similarities but are distinctive enough to allow logical separation into more manageable secure areas. Selected Answer: domai ns Correct Answer: domai ns One of the key functionalities of a central management system is inventory management, which does which of the following? Selected Answer: This system detects software that is installed on a device. Correct Answer: This system tracks devices as they connect to the LAN, which devices are on the network, and how often they connect to the LAN. Implementing security policy means continuous communication with and ensuring transparency about what’s working and what’s not working. Selected Answer: Correct stakeholde rs Answer: stakeholde rs In order to be thoughtful about the implementation of security policies and controls, leaders must balance the need to reduce with the impact to the business operations. Doing so could mean phasing security controls in over time or be as simple as aligning security implementation with the business’s training events. Selected Answer: ris k Correct Answer: ris k Business leaders rely on technology roles to be accountable for implementing security policies, monitoring their adherence, and managing day-to-day activities. The role of , for example, is to be accountable for ensuring only the access that is needed to perform day-to- day operations is granted Selected Answer: data owner Correct Answer: data owner Successful security policy implementation in the workplace depends on people understanding key concepts and embracing the material. Thus, people need to be motivated to succeed if they are going to implement such policies. There are three basic elements of motivation: pride, self- interest, and success. Which of the following does not occur when these elements are combined? Selected Answer: individuals meeting the basic expectations of their job requirements to be successful Correct Answer: individuals meeting the basic expectations of their job requirements to be successful The struggle between how to manage a business versus how to “grow” has significant implications for security policies that must reflect the core values of the business. Which of the following statements reflects one of the security policy approaches often taken by entrepreneurs growing a business? Selected Answer: A company in high-growth mode focuses on agility and innovation and tends to have a greater acceptance of risk. Correct Answer: A company in high-growth mode focuses on agility and innovation and tends to have a greater acceptance of risk. In order to gain a deeper understanding of how employees interact in the workplace, it is useful to learn about the eight classic personality types that have been identified by HR Magazine. One of these is the achievers. Which of the following descriptions best captures this personality type? Selected Answer: These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being. Correct Answer: These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being.
Written for
Document information
- Uploaded on
- June 28, 2021
- Number of pages
- 15
- Written in
- 2020/2021
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
in order to move data from an unsecure wan to a secure lan
-
you typically begin by segmenting a piece of your lan into a
-
which sits on the outside of your private network facing the public internet