100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS_462_Midterm ALL ANSWERS 100% CORRECT AID GRADE ‘A’

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
28-06-2021
Written in
2020/2021

In order to move data from an unsecure WAN to a secure LAN, you typically begin by segmenting a piece of your LAN into a , which sits on the outside of your private network facing the public Internet. Servers in this area provide public-facing access to the organization, such as public Web sites. Selected Answer: demilitarized zone (DMZ) Correct Answer: demilitarized zone (DMZ) A(n) sets expectations on the use and security of mobile devices, whereas a(n) establishes a broad set of rules for approved conduct when a user accesses information on company-owned devices. Selected Answer: corporate mobility policy, acceptable use policy Correct Answer: corporate mobility policy, acceptable use policy Using switches, routers, internal firewalls, and other devices, you can restrict network traffic with a , which limits what and how computers are able to talk to each other. Selected Answer: segmented network Correct Answer: segmented network Authentication of a workstation and encryption of wireless traffic are issues that belong to which of the following two domains? Selected Answer: workstation and LAN Correct Answer: workstation and LAN Remote authentication has always been a concern because the person is coming from a public network, and many companies require two-factor authentication for remote access. Which of the following is not one of the most commonly accepted types of credentials? Selected Answer: something you want to know Correct Answer: something you want to know Though there are many ways to group security policies, a common method is to organize common risks and related policy issues into that share similarities but are distinctive enough to allow logical separation into more manageable secure areas. Selected Answer: domai ns Correct Answer: domai ns One of the key functionalities of a central management system is inventory management, which does which of the following? Selected Answer: This system detects software that is installed on a device. Correct Answer: This system tracks devices as they connect to the LAN, which devices are on the network, and how often they connect to the LAN. Implementing security policy means continuous communication with and ensuring transparency about what’s working and what’s not working. Selected Answer: Correct stakeholde rs Answer: stakeholde rs In order to be thoughtful about the implementation of security policies and controls, leaders must balance the need to reduce with the impact to the business operations. Doing so could mean phasing security controls in over time or be as simple as aligning security implementation with the business’s training events. Selected Answer: ris k Correct Answer: ris k Business leaders rely on technology roles to be accountable for implementing security policies, monitoring their adherence, and managing day-to-day activities. The role of , for example, is to be accountable for ensuring only the access that is needed to perform day-to- day operations is granted Selected Answer: data owner Correct Answer: data owner Successful security policy implementation in the workplace depends on people understanding key concepts and embracing the material. Thus, people need to be motivated to succeed if they are going to implement such policies. There are three basic elements of motivation: pride, self- interest, and success. Which of the following does not occur when these elements are combined? Selected Answer: individuals meeting the basic expectations of their job requirements to be successful Correct Answer: individuals meeting the basic expectations of their job requirements to be successful The struggle between how to manage a business versus how to “grow” has significant implications for security policies that must reflect the core values of the business. Which of the following statements reflects one of the security policy approaches often taken by entrepreneurs growing a business? Selected Answer: A company in high-growth mode focuses on agility and innovation and tends to have a greater acceptance of risk. Correct Answer: A company in high-growth mode focuses on agility and innovation and tends to have a greater acceptance of risk. In order to gain a deeper understanding of how employees interact in the workplace, it is useful to learn about the eight classic personality types that have been identified by HR Magazine. One of these is the achievers. Which of the following descriptions best captures this personality type? Selected Answer: These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being. Correct Answer: These people are very result oriented. They genuinely want the best result and may seek different ways to bring that result into being.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
June 28, 2021
Number of pages
15
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Allan100 Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
644
Member since
4 year
Number of followers
605
Documents
3267
Last sold
1 month ago

3.5

92 reviews

5
36
4
17
3
15
2
5
1
19

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions