CIS 349 - Information Technology Audit and Control-FInal Exam V1
CIS 349 - Information Technology Audit and Control-FInal Exam V1CIS 349 - Information Technology Audit and Control-FInal Exam V1A systems administrator sets permissions to prevent unauthorized data access by certain users. Each user can perform his or her job but not access data that their job doesn't require. This is known as the principle of:A high-level statement defines an organization's commitment to security and the definition of a secure system, such as the importance of changing passwords periodically. This is a:When researching a prospective employee, for which of the following must you seek prior permission from the subject?A U.S. Department of Defense document contains information on a virus • Question 4 3 out of 3 points • Question 3 3 out of 3 points • Question 2 3 out of 3 points • Question 1 3 out of 3 points CIS 349 - Information Technology Audit and Control Drone IT developed by a bioterrorism group that easily spreads between humans and can result in widespread deaths. Which mandatory access control (MAC) classification level is most likely assigned to this document?Ensuring compliance in the Workstation Domain satisfies two main purposes: increases information security and .What provides detailed step-by-step instructions for fulfilling a security policy?Secure environments satisfy the C-I-A properties of security. C-I-A stands for .What are data classifications used by the U.S. government?There are two common types of monitoring tools available for monitoring LANs, and network software log files.In the computing industry, what does the term "in the clear" refer to?CIS 349 - Information Technology Audit and Control-FInal Exam V1A systems administrator sets permissions to prevent unauthorized data access by certain users. Each user can perform his or her job but not access data that their job doesn't require. This is known as the principle of:A high-level statement defines an organization's commitment to security and the definition of a secure system, such as the importance of changing passwords periodically. This is a:When researching a prospective employee, for which of the following must you seek prior permission from the subject?A U.S. Department of Defense document contains information on a virus • Question 4 3 out of 3 points • Question 3 3 out of 3 points • Question 2 3 out of 3 points • Question 1 3 out of 3 points CIS 349 - Information Technology Audit and Control Drone IT developed by a bioterrorism group that easily spreads between humans and can result in widespread deaths. Which mandatory access control (MAC) classification level is most likely assigned to this document?Ensuring compliance in the Workstation Domain satisfies two main purposes: increases information security and .What provides detailed step-by-step instructions for fulfilling a security policy?Secure environments satisfy the C-I-A properties of security. C-I-A stands for .What are data classifications used by the U.S. government?There are two common types of monitoring tools available for monitoring LANs, and network software log files.In the computing industry, what does the term "in the clear" refer to?
Geschreven voor
Documentinformatie
- Geüpload op
- 17 september 2021
- Aantal pagina's
- 7
- Geschreven in
- 2021/2022
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cis 349 information technology audit and control final exam v1
-
a systems administrator sets permissions to prevent unauthorized data access by certain users each user can perform his or her job but