CSIS 340-D04 LUO
Fall 2020
Score-100% out of 100%
Question 1
4 out of 4 points
A typical data leakage protection program provides several layers of defense to prevent confidential
data from leaving the organization. Which of the following is not one of the layers of defense?
inventory
perimeter
device management
self-regulation
Question 2
4 out of 4 points
Bring Your Own Device (BYOD) is a current trend within many organizations, which raises a host of
security policy questions that must be addressed for handheld device use. Which of the following is not
one the questions?
What is a reason the person owns the device?
Who has the right to wipe the device if it’s lost or stolen?
How do you encrypt data on the device?
Who’s allowed to have a BYOD device connected to the company network?
Question 3
4 out of 4 points
Which of the following is not one of the common network devices found on the LAN domain?
flat network
, switch
router
firewall
Question 4
4 out of 4 points
To be compliant with the security standards and processes outlined in NIST publications, policies must
include key security control requirements. Which of the following is not one of the key requirements?
inventory
data privacy
categorize by risk level
security controls
Question 5
4 out of 4 points
The Family Educational Rights and Privacy Act (FERPA) was put into law in 1974, and contains several key
elements. Which of the key elements states that schools can share information without permission for
legitimate education evaluation reasons as well as for health and safety reasons?
unblocking
permission
exclusions
awareness
Question 6
4 out of 4 points
_______________ is a measurement that quantifies how much information can be transmitted over the
network.
Memory