100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIT 425 Security and Risk Management Domain Practice Answers

Rating
-
Sold
-
Pages
14
Grade
A
Uploaded on
19-05-2024
Written in
2023/2024

1. Which of the following is NOT an example of security control that ensures confidentiality? a. Data classification b. Encryption c. Restricting changes d. Network traffic padding 2. Which of the following is an administrative security control? a. Personnel screening b. Encryption c. Authorization d. Security guards 3. Which of the following is a technical security control? a. Standards b. Security devices c. Door locks d. Personnel screening 4. Which of the following is a physical security control? a. Logical access controls b. Security awareness training c. Identification d. Environmental controls 5. Which of the following is the best personnel arrangement for the design and management of security for an organization? a. A single security professional from within the organization b. A team of security professionals from the organization c. A team of employees representing every department within the organization d. An outside consultant 6. Which of the following is an example of an administrative security control? a. security guards b. policies c. locks d. intrusion detection systems 7. Which of the following is NOT one of the fundamental principles of security included in the CIA triad? a. Confidentiality b. Integrity c. Accountability d. Availability 8. The ability of a computer system to provide adequate capacity for predictable performance represents which of the fundamental security principles of the CIA triad? a. Confidentiality b. Integrity c. Accountability d. Availability 9. Which of the following is an example of a technical security control? a. procedures b. awareness training c. perimeter lighting d. encryption 10. Which of the following is an example of a physical security control? a. Rules based access controls b. CCTV c. Exit interviews d. Traffic tunneling 11. Which of the following is an example of a security control that focuses on maintaining availability? a. Encrypted transport of data b. Quick recovery from faults c. Fixed packet length transmissions d. User awareness training 12. What security best practice requires that a user be given no more rights than are necessary to perform a task? a. Job rotation b. Mandatory vacations c. Principle of least privilege d. Separation of powers/duties 13. Which type of access control is focused on avoiding occurrence? a. Compensating b. Detective c. Deterrent d. Preventive 14. A security awareness program’s primary function is to: a. Improve the organization’s attitude about protecting data b. Improve the performance of the organization’s intranet c. Improve the security of vendor relations d. Provide career opportunities to security personnel 15. In terms of the concept of due care, which of the following statements is NOT correct? a. It may and usually does require extraordinary care b. It implies that a person has been guilty of a violation of law in regard to a transaction or subject matter c. It is defined as that care with which a prudent person would have acted in the same or similar conditions or situation d. It involves just, sufficient and proper care provided the circumstances demand it 16. Which of the following is NOT one of the three security control types that a security administrator can employ to manage and impose security? a. Administrative b. Technical c. Strategic d. Physical 17. A is the absence or weakness in a system that could possibly be exploited by an attacker. a. countermeasure b. risk c. threat d. vulnerability 18. Which of the following is NOT a form of administrative detective controls? a. Job rotation b. Mandatory vacations c. Separation of powers d. Security reviews and audits 19. Which of the following is a valid definition for confidentiality? a. Unauthorized disclosure is prevented. b. Unauthorized modification is prevented c. Resources are accessible at all times by authorized users. d. Disasters can be recovered from quickly. 20. A security administrator may employ all but which of the following types of controls to implement a security solution? a. executive b. administrative c. technical d. physical 21. Which of the following is NOT an example of an administrative security control? a. Standards b. Guidelines c. Identification d. Personnel screening

Show more Read less
Institution
CMIT 425
Course
CMIT 425









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CMIT 425
Course
CMIT 425

Document information

Uploaded on
May 19, 2024
Number of pages
14
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cmit 425

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectsavvy Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
90
Member since
2 year
Number of followers
39
Documents
3682
Last sold
2 weeks ago
Lectsavvy

Unlock academic success with me! I'm Lectsavvy, your go-to expert for top-notch study materials, notes, and exam prep on Stuvia. Browse my uploads for: Accurate and concise notes Exam-focused study guides Past papers and solutions High-quality summaries Let's ace those exams together! Follow me for updates, and feel free to reach out with any questions or requests.

4.0

15 reviews

5
9
4
0
3
4
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions