CIS 349 - Information Technology Audit and Control - Final Exam V2
CIS 349 - Information Technology Audit and Control - Final Exam V2CIS 349 - Information Technology Audit and Control - Final Exam V2are mechanisms that repair damage caused by an undesired action and limit further damage, such as the procedure to remove viruses or using a firewall t'o block an attacking system.'Which of the following best describes corrective controls?When hiring personnel, you should communicate your organization's security policy clearly. The employee's or contractor's is a common document that accomplishes this taskI. List tasks along one axis and personnel or roles along the other axis. II. Assign a level or responsibility for each role and task. III. Assign each person or role a level of responsibility and accountability for each task. The above three steps pertain to the creation of theRegarding system access controls, what is meant by the term "subject"?Of the following, what is the best method of maximizing integrity in the Workstation Domain?Of the following, what is the best method of reducing the success of fingerprinting attacks on computers?Secure environments satisfy the C-I-A properties of security. C-I-A stands for .Which of the following is NOT a step to ensuring only authorized users can see confidential data in the LAN Domain?The hardware that provides one or more services to users, such as server computers, printers, and network storage devices, are known as:CIS 349 - Information Technology Audit and Control - Final Exam V2are mechanisms that repair damage caused by an undesired action and limit further damage, such as the procedure to remove viruses or using a firewall t'o block an attacking system.'Which of the following best describes corrective controls?When hiring personnel, you should communicate your organization's security policy clearly. The employee's or contractor's is a common document that accomplishes this taskI. List tasks along one axis and personnel or roles along the other axis. II. Assign a level or responsibility for each role and task. III. Assign each person or role a level of responsibility and accountability for each task. The above three steps pertain to the creation of theRegarding system access controls, what is meant by the term "subject"?Of the following, what is the best method of maximizing integrity in the Workstation Domain?Of the following, what is the best method of reducing the success of fingerprinting attacks on computers?Secure environments satisfy the C-I-A properties of security. C-I-A stands for .Which of the following is NOT a step to ensuring only authorized users can see confidential data in the LAN Domain?The hardware that provides one or more services to users, such as server computers, printers, and network storage devices, are known as:
Written for
- Institution
- Strayer University
- Module
- CIS 349 - Information Technology Audit and Control
Document information
- Uploaded on
- September 17, 2021
- Number of pages
- 7
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cis 349 information technology audit and control final exam v2
-
cis 349 information technology audit and control final exam v2are mechanisms that repair damage caused by an undesired action and